•
Sorting—Click the column header to sort columns in ascending or descending order.
•
Rearranging Columns—Drag a column header to a new position in the table to rearrange
the order of the columns in the viewer.
All filter criteria are saved each time you log out of the UI.
Example: Setting a Time Interval
Profiler queries that return a very large amount of data may not complete in an acceptable
amount of time. By default, queries that take longer than 120 seconds (2 minutes) will
time out.
You can reconfigure the timeout using the Profiler settings under the
Tools
menu.
If the Profiler times out before your query is finished, refine your filter criteria. For example,
if you want to analyze a specific event in your internal network, set a time interval for the
data.
The Profiler records the first-seen and last-seen timestamps for each entry in the
database. You can set a time interval based on these timestamps. You can set an exact
From and To time, or enter the Last day, hour, minute, or seconds:
•
Use the
First Seen
setting to define a start timestamp threshold. If the device logged
an event for the first time, and the event timestamp is after the start timestamp, the
event appears in the Profiler view. For example, to see all new events in the last 2 days,
configure the First Seen timestamp as the last 2 days.
•
Use the
Last Seen
setting to define a last timestamp threshold. If the device logged
an event, and the event timestamp is before the last timestamp, the event appears in
the Profiler view. For example, to see what network components have been idle over
the last 10 days, configure the Last Seen timestamp as the last 10 days.
After you have configured a time interval, the selected Profiler view automatically applies
the time interval as a filter criterion.
Filtering and Sorting from the Application Profiler
To help you view and analyze data in the Application Profiler, you can use criteria to filter
information.
You can double-click in the Src IP and Dst IP address column fields that appear in the
Filter Criteria
to add entries that match the column you selected as a criterion to filter
the Application Profiler view. You can also right-click on any entry in the Profiler view and
select
Add to Filter
to add that entry as a filter criterion. Similarly, you can use the
Remove
From Filter
option to remove that entry as a filter criterion.
NOTE:
You cannot filter on the Application column of the Application Profiler.
Click on the
Negate
option to hide entries that match the criteria that you have set as a
filter. You can also right-click on any entry in the Profiler view and select
Toggle Filter
Negation
to hide entries that match that criterion.
723
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...