Security Reports
The Security Reports section includes reports that help in monitoring and analyzing the security and effectiveness of the firewall, and assist in identifying, tracking, and investigating potential security risks. On the top right side of the Report screen, there will be three combo boxes. They are: Top 5 The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the report uses only tables. There is an option to display the Graph only. - Top 5 (graph & table)
- Top 10 (graph & table)
- Top 15 (table only)
- Top 20 (table only)
- Top 25 (table only)
- Graph only
Below each graph click the Hide Table link to hide the table. Click the Show Table link to see the table again. Filter by The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are: - Source
- Destination
- Protocol
- Summary
Export as The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are: Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values). The Top Denied Hosts report shows the top source IP addresses or host names that have been denied requests for the selected time period. The Top Denied Destinations report shows the top destination IP addresses or host names that have been denied responses for the selected time period. Drill down from these graphs to see the following details: | Field | Description |
|---|
| Destination/ Host | The destination host name or IP address to which requests were denied/ The host name or IP address of the host whose requests were denied | | Protocol | The protocol used by the denied request | | Hits | The number of times the request was generated | | Time | The timestamp of the last time when the request was received | | Message | The message generated when the request was denied |
The Top Denied Protocols report shows the top protocols that have been denied requests for the selected time period. Drill down from this graph to see the following details: | Field | Description |
|---|
| Host | The host name or IP address of the host whose requests were denied | | Destination | The destination host name or IP address that denied the request | | Hits | The number of times the request was generated | | Time | The timestamp of the last time when the request was received | | Message | The message generated when the request was denied |
The Top Security Events pie-graph shows the top events generated with severity as Emergency, Critical, Alert, Error, or Warning. Drill down from this graph to see the following details: | Field | Description |
|---|
| Host | The host name or IP address of the host generating denied events | | Severity | The event severity of the event generated | | Hits | The number of times the event was generated | | Time | The timestamp of the last time when the event was generated | | Message | The event message generated |
The Top Blocked URLs report shows the top URLs that were blocked for the selected time period. In this report you will see the following details: | Field | Description |
|---|
| Host | The host name or IP address of the host whose requests were pointing to blocked URLs | | Destination | The destination host name or IP address that denied the request | | URL | The URL of the web site which was blocked | | Hits | The number of times the request was generated |
|