Table 60: Attack Counters
(continued)
Description
Item
As packets traverse different networks, it is sometimes necessary to break
a packet into smaller pieces (fragments) based upon the network's maximum
transmission unit (MTU). IP fragments may carry an attacker's attempt to
exploit the vulnerabilities in the packet reassembly code of specific IP stack
implementations. When the target system receives these packets, the results
range from not processing the packets correctly to crashing the entire system.
When you enable the security device to deny IP fragments on a security zone,
the security device blocks all IP packet fragments that it receives at interfaces
bound to that zone.
Block Frag
The name of the zone associated with the attack.
Zone
Viewing Zone Statistics
You can view traffic information as it is processed by a security device over specific zones.
You can view Ethernet statistics, flow statistics, and attack statistics.
Viewing System Statistics
You can also view system-related information for a security device.
Viewing Resource Statistics
Click the
Resource Statistics
node to view the resources for a security device. Table 61
on page 681 describes all the information that is available from the Resource Statistics
view:
Table 61: Resource Statistics Items
Description
Item
The average CPU usage of the security device.
Avg. CPU Utilization
The current memory allocation to the security device.
Memory Allocated
The remaining usable memory.
Memory Left
The percentage of blocks that are fragmented.
No. of Fragment Blocks
The number of currently active sessions.
Active Sessions
The number of allocated sessions.
Allocated Sessions
The maximum sessions allowed.
Max. Sessions Allowed
The number of sessions that failed to allocate (after maximum
reached).
Failed Sessions
Viewing Active Statistics
Click the
Active Statistics
node to view administrator and user activities for a security
device. The
Administrators
tab displays information about the administrators, including
681
Copyright © 2010, Juniper Networks, Inc.
Chapter 17: Realtime Monitoring
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...