Enabling OS Fingerprinting
OS fingerprinting passively detects the operating system of an end-host by analyzing
TCP handshake packets. To ensure that this works, you need to verify that OS
fingerprinting is first enabled on the profiled device. After you have configured the Profiler
with the tracked hosts, contexts, you must update the device.
OS fingerprinting works only for packets that contain a full-fledged TCP connection, one
that has a SYN, a SYN/ACK, and a FIN connection. OS fingerprinting only works for
operating systems that are supported on the device. A list of the supported operating
systems is available on the device in a file called
fingerprints.set
in the /usr/idp/device/cfg/
directory.
Configuring Network Objects
The first part of configuring the Profiler is to tell the device which network objects you
want the device to profile. When you start the Profiler, the device begins collecting data
from the selected hosts.
In the
Tracked Hosts
tab, select the network objects that represent your internal hosts.
The device collects detailed information about traffic that passes between internal hosts,
and groups traffic that does not match an internal host in a special IP:
73.78.69.84
.
Communication between an internal host and an external host is recorded only once.
For example, the device records internal host A communicating to
www.yahoo.com
and
www.cnn.com
as one entry in the Profiler DB.
You can select unlimited internal network objects.
You can also use the
Exclude List
tab to select the network objects that represent internal
hosts you do not want to include in IDP profiling. You might want to exclude a host from
the Profiler if you selected a group of network objects in the
Tracked Host
tab but want
to exclude specific members of that group.
Configuring Context Profiles
Next, determine which contexts you want the device to record. In the
Contexts to Profile
tab, the context list includes only the contexts that can clearly identify a host, a user, or
an application. Select contexts that the device profiles. When you start the Profiler, the
device begins collecting data on traffic that matches the selected contexts.
Example: Selecting Contexts
To track FTP logins, usernames, and commands, select the FTP contexts in the
Contexts
to Profile
tab. After the Profiler is started, the device begins collecting information about
FTP logins, usernames, and commands, enabling you to quickly identify who is using FTP
on your network and what they are doing over that protocol.
When you first configure the Profiler, select all contexts. This enables the device to collect
data about every context on your network, giving you a complete view of your network
traffic. Later, when you have analyzed your traffic, you can eliminate contexts that you
know will not be used on your network.
713
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...