The Streaming and Chat Sites Reports section includes reports on streaming and chat sites visited. In order to identify your external hosts, you need to first configure your intranets by clicking the Intranet Settings link from the Settings tab. When configured, all hosts outside your configured intranets will be considered as external hosts.
On the top right side of the Report screen, there will be three combo boxes. They are:
The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the report uses only tables. There is an option to display the Graph only.
Below each graph click the Hide Table link to hide the table. Click the Show Table link to see the table again.
The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are:
The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:
Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).
The Top Streaming and Chat Sites graph shows the top streaming and chat sites that are sending and receiving traffic through the firewall. Here you can expect only IP's outside your LAN. The table below the graph shows the IP address, along with the number of hits, bytes received, bytes sent, and the total bytes (sent + received) of traffic generated.
The Top Protocols graph shows the top protocols used for accessing the streaming and chat sites through the firewall. The table below the graph shows the protocol used by the internal host to access the streaming and chat site, along with the absolute number of hits, bytes received, bytes sent, and the total bytes (sent + received) of traffic generated.
The Top Sources graph shows the top hosts that accessed the streaming and chat sites. The table below the graph shows the internal host accessing the streaming and chat site, along with the number of hits, bytes received, bytes sent, and the total bytes (sent + received) of traffic generated.
The Top Attacks Using Streaming and Chat Protocols table lists details like host, its destination, the protocol used for the conversation, the name or id (as defined by the firewall) of the attack, the attack count, status of the attack, and the attack message generated by the firewall.