Table 63: Authenticated Users View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Table 64: Active Sessions Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Table 65: HA Statistics View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Table 66: Device Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Table 67: IDP Device Detail Status Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Table 68: IDP Sensor Process Status Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Table 69: Device Statistics Summary (for IDP Sensors) . . . . . . . . . . . . . . . . . . . 689
Table 70: VPN Tunnel Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Table 71: NSRP Device Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Table 72: VSD/RTO Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Table 73: VSD Counter Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Table 74: RTO Counters Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Table 75: IDP Cluster Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Table 76: IDP Cluster Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Table 77: IDP Cluster Member Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Table 78: Server Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Table 79: GUI Server Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Table 80: Server Monitor (Machine-wide Info) Data . . . . . . . . . . . . . . . . . . . . . . . 701
Table 81: Server Detail Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Table 82: Process Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Table 83: Management System Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Chapter 18
Analyzing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Table 84: General IDP Profiler Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Table 85: Protocol Profiler Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Table 86: Network Profiler Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Table 87: Applciation Profiler Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Table 88: Detailed Network Information Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Table 89: Transitional Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Chapter 19
Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
Table 90: Event-Generated Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740
Table 91: Log Entry Severity Levels for DMI Devices . . . . . . . . . . . . . . . . . . . . . . . . 741
Table 92: Log Entry Severity Levels for ScreenOS and IDP Devices . . . . . . . . . . . 741
Table 93: Destinations of Log Entry Severities . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
Table 94: Self Log Entry Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Table 95: Email Server Settings for Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Table 96: Syslog Settings for Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
Table 97: WebTrends Settings for Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
Table 98: EX Series Switch Predefined Log Views . . . . . . . . . . . . . . . . . . . . . . . . 757
Table 99: SSL/UAC Predefined Log Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Table 100: Predefined Log Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
Table 101: Log Viewer Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Table 102: Log Viewer Navigation Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Table 103: Search Tools for Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Table 104: Log Viewer Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Table 105: Irrelevant Versus Relevant Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Table 106: Log Investigator Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Table 107: Log Investigator Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Table 108: Audit Log Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
xliii
Copyright © 2010, Juniper Networks, Inc.
List of Tables
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...