Home » Firewall Reports » Application Reports

Application Reports


 

The Application Reports are available only for Fortigate, Check Point, and SonicWALL Firewalls. This section includes reports that help in monitoring the bandwidth consumed by the application accessed by user like Skype, Facebook, Youtube etc.

 

Note:

  • Ensure that the Fortigate Firewall has Application Control service to generate Application logs, which is for creating Application reports.
  • The Application report is available only in Standalone and Collector servers of Firewall Analyzer

 

 

Select the device using Select Device: <> drop down list to get the Application reports

 

Export as

 

The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:

  • PDF
  • CSV

Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).

 

Schedule Report

 

You can schedule the report to be generated at pre-configured periodic interval.

 

On demad Application report can be created.

 

The Application graph shows distribution of application events like Skype, Facebook, Youtube, etc. generated for each selected device. At one glance, you can see the total traffic generated by each application/category across each device. You can also drill down the pie-chart to see specific application usage.

 

Drill down from each of the above graphs to see the following graphs:

 

Graph Description
Top Hosts The top hosts generating traffic using this application
Top Protocols The top protocols used in this application
Top Users The top users generating traffic using this application
Top Conversations The top conversations carried out by this application

 

The Top Hosts graph shows the top hosts contributing to application traffic to the firewall. The table below the graph shows the host name or IP address, along with the number of hits and the total bytes of traffic generated.

 

The Top Protocols graph shows the top protocols contributing to application traffic to the firewall. The table below the graph shows the protocol, along with the number of hits and the total bytes of traffic generated.

 

The Top Users graph shows the top users contributing to application traffic to the firewall. The table below the graph shows the users, along with the number of hits and the total bytes of traffic generated.

 

The Top Conversations table lists details like host which initiated the conversation, its destination, the protocol used for the conversation, the application category along with the number of hits, the total bytes of traffic generated and % of total traffic for the particular conversation.

 

The table, shows the graph's data in more detail, with specific percentage values of incoming and outgoing traffic per application/category for the selected device. The Show bar lets you view the the top 5(default) / 10 / 15 or All application groups, captured in the logs. You can click on the Traffic IN, Traffic OUT,Total Traffic for each application of the configured device to obtain the drill-downs of the traffic.

 

The table lists details like host which initiated the conversation, its destination, the protocol used for the conversation, the user along with the number of hits and the total bytes of traffic generated for the particular application traffic.

 

Columns Description
Applications The list of applications accessed using the selected Firewall
Categories The list of application categories accessed using the selected Firewall
Traffic In (MB) The % of total traffic and amount of inward traffic that was generated by the application/category
Traffic Out (MB) The % of total traffic and amount of outward traffic that was generated by the application/category
Total Traffic (MB) The % of total traffic and amount of total traffic that was generated by the application/category

 

 

Copyright © 2013, ZOHO Corp. All Rights Reserved.
ManageEngine