Applications
DPI Deep Packet Inspection. DPI is an advanced method of network packet filtering that is used for inspecting data packets exchanged between the devices and systems over a network. DPI functions at the Application layer of the Open Systems Interconnection (OSI) reference model and enables users to identify, categorize, track, reroute, or stop packets passing through a network. of local traffic and detects over 1500 applications on the network. allows you to configure both application and application category policies within a given user role.
performsEnable DPI Deep Packet Inspection. DPI is an advanced method of network packet filtering that is used for inspecting data packets exchanged between the devices and systems over a network. DPI functions at the Application layer of the Open Systems Interconnection (OSI) reference model and enables users to identify, categorize, track, reroute, or stop packets passing through a network. to enhance the benefit of the existing visualization or dashboard, To enable DPI Deep Packet Inspection. DPI is an advanced method of network packet filtering that is used for inspecting data packets exchanged between the devices and systems over a network. DPI functions at the Application layer of the Open Systems Interconnection (OSI) reference model and enables users to identify, categorize, track, reroute, or stop packets passing through a network. , see the Enabling DPI section.
Navigate to managed device. See Figure 1 for page.
and click icon. The page displays the summary of all the applications in theAction Bar
The Action bar displays the total number of applications depending on filters applied. The action bar includes action icons namely,
, , , and .You can perform the following tasks on this page:
- — Click icon to filter and list the applications in the table that you want to view.
- — This button allows you to permit or deny an application or an application category for a given role. You can create global and per-role rules. For example, you can block the YouTube application, which belongs to the Streaming application category for the guest role within the enterprise.
To
, perform the following steps:- Select a application from the table.
Details
Expand the application from the Figure 2 for Details page.
table to view the detailed information of individual application. SeeThe application table displays the following details:
- — Displays five hosts with highest application usage, in decreasing order. Click the horizontal bar or hyperlinked number to navigate to the table and view the details of the hosts using this application.
- — Displays five destinations with highest usage, in decreasing order. Click the horizontal bar or hyperlinked number to navigate to the table and view the details of the destination using this application.
- WLAN Wireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. in a donut chart. Click the donut chart area or hyperlinked number to navigate to the table and view the details of the sessions established by this application. — Displays the number of sessions established by the application for each
- — Displays the number of sessions established by the application for each OS in a donut chart. Click the donut chart area or hyperlinked number to navigate to the table and view the details of the sessions established by this application.
- — Displays the number of sessions established by the application for each role in a donut chart. Click the donut chart area or hyperlinked number to navigate to the table and view the details of the sessions established by this application.
— Displays the distribution of traffic. You can view the following information using the drop-down list.