Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Use Case: View Network Paths in the Topology

The topology in JSA Risk Manager displays a graphical representation of your network devices.

A topology path search can determine how your network devices are communicating and the network path that they use to communicate. Path searching allows JSA Risk Manager to visibly display the path between a source and destination, along with the ports, protocols, and rules.

You can view how devices communicate, which is important on secured or restricted access assets.

Key features include:

  • Ability to view communications between devices on your network.

  • Use filters to search the topology for network devices.

  • Quick access to view device rules and configuration.

  • Ability to view events that are generated from a path search.

Searching the Topology

Topology search is used to filter your network topology view, and zone in on network paths, hosts, subnets, and other network elements. Investigate various elements of your network infrastructure by using topology search.

A path search is used to filter the topology model. A path search includes all network subnets that contain the source IP addresses or CIDR ranges and subnets that contain destination IP addresses or CIDR ranges that are also allowed to communicate by using the configured protocol and port. The search examines your existing topology model and includes the devices that are involved in the communication path between the source and destination and detailed connection information.

  1. Click the Risks tab.

  2. On the navigation menu, click Topology.

  3. From the Search list box, select New Search.

  4. In the Search Criteria pane, select Path.

  5. In the Source IP/CIDR field, type the IP address or CIDR range on which you want to filter the topology model. Separate multiple entries by using a comma.

  6. In the Destination IP/CIDR field, type the destination IP address or CIDR range on which you want to filter the topology model. Separate multiple entries by using a comma.

  7. Optional: From the Protocol list, select the protocol that you want to use to filter the topology model.

  8. Optional: In the Destination Port field, type the destination port on which you want to filter the topology model. Separate multiple ports by using a comma.

  9. Optional: Select a protocol from the Protocol menu.

  10. Optional: Type a destination port.

  11. Optional: Click Select Applications.

    1. From the Device Adapter menu, select the device adapter type.

    2. Type a partial or full search term or leave the Application Name field empty, and then click Search.

    3. Select any of the displayed applications in the Search Results field, and click Add to add your selections to the Selected Items box.

    4. Click OK.

  12. Optional: Click Select Vulnerabilities.

    1. From the Search By menu, select the vulnerability category.

    2. In the Field beside the Search By menu, enter the ID number of the vulnerability.

    3. Click Search.

    4. Select any of the displayed vulnerabilities in the Search Results field, and then click Add to add your selections to the Selected Items box.

    5. Click Save.

      If your topology includes an Intrusion Prevention System (IPS), the vulnerabilities search option is displayed. For more information, see the Juniper Secure Analytics Risk Manager User Guide.

  13. Optional: Click Select Users/Groups.

    1. Type a partial or full search term or leave the User/Group Name field empty, and then click Search.

    2. Select the user or group name in the Search Results field, and then click Add to add your selections to the Selected Items box.

    3. Click OK, and then click Search.

  14. Click Search to view the results.