Proxy Server Reports - Top Talkers Reports


The Top Talkers section includes reports that show the top hosts and protocols generating traffic through the proxy server. 

The Top LAN Hosts and the Top LAN Users graphs show the respective top hosts and top users whose requests have been processed by the proxy cache itself. The table below the graph shows the host name, IP address, or user name of the source, along with the protocol used, the number of hits, and the total traffic in bytes. 

The Top WAN Hosts and the Top WAN Users graphs show the respective top hosts and top users whose requests could not be processed by the proxy cache. The table below the graph shows the host name, IP address, or user name of the source, along with the protocol used, the number of hits, and the total traffic in bytes. 

The Top Users (LAN + WAN) shows the top values when the Top LAN Users and Top WAN Users records are combined. The table shows the User, the host name or IP address of the source from which he is conducting the conversation, the type of user (LAN or WAN) , the number of hits and bandwidth usage.

Drill down from each of the above graphs to see the following details: 

ReportDescription
Top SitesThe top web sites accessed by this user or host
Top URLsThe top web pages or URL's accessed by this user or host
Top Denied URLsThe top web pages that were denied for this user or host
Cache Usage - Cache CodeThe cache usage by this user or host, based on cache code
Proxy Usage - HTTP Status CodeThe proxy usage by this user or host, based on HTTP status code
Proxy Usage - Peer StatusThe proxy usage by this user or host, based on peer status
Top Users/HostsThe top users or hosts accessing the proxy through this host/user

 

Featured links

Thank you for your feedback!

Was this content helpful?

We are sorry. Help us improve this page.

How can we improve this page?
Do you need assistance with this topic?
By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
A single platter for comprehensive Network Security Device Management