2.
Take appropriate measures to secure the network, for example:
•
Investigate the source IP of the traffic and contact the user. If the traffic is legitimate,
you might need to add the service to your corporate security policy to allow it on
your network. You should also edit the permitted object to include the service so
you no longer see the service in the Violation view.
•
Create a rule in your security policy that drops connections between your internal
network objects if the traffic uses a service that you do not allow on your network.
About the Application Profiler
The Application Profiler view is a table of information that allows you to view network
traffic information at the application and application group level. By default, this view
contains only the data collected during the configured time interval. You can also specify
filters to display only the data you want to view.
As the applications that are running on the network form a hierarchy, the volume of traffic
that is generated by individual applications or application groups can be added to provide
the aggregate traffic volume information from the parent application group. As you move
up the root of the application hierarchy, you can view the total network traffic volume.
The Application Profiler view is divided into two sections: on the left panel, the hierarchical
application view displays a tree of the application categories with volume information
(in bytes and packets); on the right panel the application session view displays the
application name and the aggregated bytes and packets for the application. You can
expand the application name to see latest session data for that application.
Table 87 on page 721 lists and describes the information that you can view using the
Protocol Profiler:
Table 87: Applciation Profiler Data
Description
Column
Source IP address of the traffic profiled.
Src IP
Destination IP address of the traffic profiled.
Dst IP
VLAN ID associated with the traffic profiled.
VLAN ID
Application ID associated with the traffic profiled.
Application
Byte count for the traffic profiled.
Byte Count
Packet count for the traffic profiled
Packet Count
The user login name.
User
The role group to which the user that is associated with the traffic profiled
belongs.
Role
721
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...