Monitoring:
The system includes several dashboards that you can use to analyze the traffic going through
the device and the results of your security policy. Use the information to evaluate the overall
efficacy of your configuration and to identify and resolve network problems. The data used in
traffic-related dashboards is collected from access control rules that enable connection or file
logging, and other security policies that allow logging. The dashboards do not reflect traffic that
matches rules for which no logging is enabled.
System:
Shows an overall system view, including a display of interfaces and their status, overall average
system throughput, and summary information on system events, CPU usage, memory usage,
and disk usage. You can restrict the throughput graph to show a specific interface rather than
all interfaces. Interface-related statistics such as throughput does not include subinterfaces.
1 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717
Network Overview:
Shows summary information about the traffic in the network, including the access rules
(policies) matched, users initiating traffic, applications used in connections, intrusion threats
(signatures) matched, URL categories for URLs accessed, and the most frequent destinations for
connections.
Users:
Shows the top users of your network. You must configure identity policies to see user
information. If there is no user identity, the source IP address is included.
2 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717
Applications:
Shows the top applications, such as HTTP, that are being used in the network. The information
is available only for connections that are inspected. Connections are inspected if they match an
“allow” rule, or a block rule that uses criteria other than zone, address, and port. Thus,
application information is not available if the connection is trusted or blocked prior to hitting
any rule that requires inspection.
Web Applications:
Shows the top web applications, such as Google, that are being used in the network. The
conditions for collecting web application information are the same as those for the Application
dashboard.
URL Categories:
Shows the top categories of web sites, such as Gambling or Educational Institutions, that are
being used in the network based on the categorization of web sites visited.
3 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717
Events:
To view events as they occur. You must enable connection logging in individual access rules to
see connection events related to those rules. Also, enable logging in the Security Intelligence
policy and SSL decryption rules to see Security Intelligence events and additional connection
event data. These events can help you resolve connection problems for your users.
Connection Events:
An access rule must enable connection logging. You can also enable connection logging in the
Security Intelligence policy and in SSL decryption rules.
Intrusion Events:
An access rule must apply an intrusion policy.
File and Malware Events:
An access rule must apply a file policy and enable file logging.
Security Intelligence Events:
You must enable and configure the Security Intelligence policy and enable logging.
4 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717
Click Pause to stop the addition of new events so that you can more easily find and analyze an
event. Click Resume to allow new events to appear. Select a different refresh rate (5, 10, 20, or
60 seconds) to control how fast new events are shown. Create a custom view that includes the
columns you want. To create a custom view, either click the + button in the tab bar, or click
Add/Remove Columns. click View Details to see complete information on an event.
If necessary, apply a filter to the table to help you locate the desired events based on various
event attributes. To create a new filter, either manually type in the filter by selecting atomic
elements from the drop-down list and entering the filter value.
5 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717