About the Application Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Using Profiler Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Filtering and Sorting from the Protocol Profiler, Network Profiler, and
Violation Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Filtering and Sorting from the Application Profiler . . . . . . . . . . . . . . . . . 723
Refreshing Profiler Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Viewing Database Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Viewing Detailed Network Information . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Purging the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
Recommended Profiler Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
Configuring a Network Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Identifying a Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Setting a Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Keeping Your Network Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Proactively Updating Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728
Reacting to Vulnerability Announcements . . . . . . . . . . . . . . . . . . . . . . . . . . 728
Example: Identifying Vulnerable Components . . . . . . . . . . . . . . . . . . . . 728
Stopping Worms and Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Example: SQL Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
Example: Blaster Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
Accessing Data in the Profiler Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
About Security Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Security Explorer Main Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Graph Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Connections Detail Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Reference Point Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Reports Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Using Security Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Analyzing Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Viewing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Transitioning to Other Relational Graphs . . . . . . . . . . . . . . . . . . . . . . . . 736
Setting a Time Duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Viewing Predefined Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Refreshing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Adding and Removing Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Exporting to HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Chapter 19
Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
About Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
About Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740
About Log Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740
About Log Severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Viewing Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
Device Limitations for Viewing Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
xxxi
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...