- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow Network Risk Assessment
- play_arrow Network Risk Assessment
- play_arrow Policy Monitor Question Parameters
- play_arrow Searching for Assets in your Network
- play_arrow Policy Monitor Question Backup
- play_arrow Integration with JSA Vulnerability Manager
- play_arrow CIS Benchmark Scans
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Reports
- play_arrow Audit Log Data
Topology Models
SUMMARY You can use a topology model to define virtual network models based on your existing network.
You can create a network model based on a series of modifications that can be combined and configured. By creating a network model, you can determine the effect of configuration changes on your network by using a simulation. For more information about simulations, see Network Simulations in JSA Risk Manager.
Topology models provide the following information:
Parameter | Description |
---|---|
Model Name | The name of the topology model, as defined by the user when created. |
Group(s) | The groups to which this topology is associated. |
Created By | The user who created the model definition. |
Created On | The date and time that the model definition was created. |
Last Modified | The number of days since the model definition was created. |