Traffic Analysis

The Traffic Analysis page provides the summary of APPLICATIONS, DESTINATIONS, HOSTS, and WEBSITES features. See Figure 1 for Traffic Analysis page.

Figure 1  Traffic Analysis Page

You can click the hyperlinked number of a particular feature to navigate to its table to view more information.

 

The Traffic Analysis dashboard application visibility feature is supported only in 7000 Series, 7200 Series , and x86 managed devices, and requires WebCC and PEFNG Policy Enforcement Firewall. PEF also known as PEFNG provides context-based controls to enforce application-layer security and prioritization. The customers using Aruba mobility controllers can avail PEF features and services by obtaining a PEF license. PEF for VPN users—Customers with PEF for VPN license can apply firewall policies to the user traffic routed to a controller through a VPN tunnel. license.

The Traffic Analysis dashboard contains the following windows:

APPLICATIONS—This window displays the summary of all applications in the managed device. This is the default page. Click the Applications window or hyperlinked number to navigate to the Applications table and view the details of the applications currently in use. For more information, see Applications.

You can view the following information using the Show applications drop-down list.

By categories — Displays all the applications by categories.

With highest usage — Displays five applications with highest number of bytes transmitted or received, in decreasing order. Click the horizontal bar to display the details of the selected application.

With most hosts — Displays five applications with highest number of hosts, in decreasing order. Click the horizontal bar to display the details of the selected application.

DESTINATIONS—This window displays the summary of all active destinations in the managed device. This is the default page. Click the horizontal bar or hyperlinked number to navigate to the Destinations table and view the details of the active destinations. For more information, see Destinations.

You can view the following information using the Show destinations drop-down list.

With highest usage — Displays five destinations with highest number of bytes transmitter or received, in decreasing order. Click the horizontal bar to display the details of the selected destination.

With most hosts — Displays five destinations currently accessed by highest number of hosts, in decreasing order. Click the horizontal bar to display the details of the selected destination.

WEBSITES—This window displays the summary of all websites visited using the managed device in the network hierarchy. This is the default page. For more information, see Websites.

You can view the following information using the Show websites drop-down list.

By reputation — Displays percentage of traffic based on reputation or score of web traffic in the managed device. The reputation levels are Trustworthy, Low risk, Moderate risk, Suspicious, High risk, and Unknown. Click the pie chart to display details of the selected reputation level.

By web categories — Displays the number of bytes transmitted or received by web categories in tree chart presentation. Click on the rectangle tile of a selected web category to show the number of bytes transferred for the selected web category that is grouped by reputation.

With highest usage — Displays five websites with the highest number of bytes transmitted or received, in decreasing order in chart presentation. Click the horizontal bar to display details of the selected website.

With most hosts — Displays five websites with the highest number of clients currently connected, in decreasing order in chart presentation. Click the horizontal bar to display details of the selected website.

HOSTS—This window displays the summary of all active hosts in the managed device. This is the default page. Click the horizontal bar or hyperlinked number to navigate to the Hosts table and view the details of the active hosts. For more information, see Hosts.

You can view the following information using the Show hosts drop-down list.

With highest usage — Displays five hosts with highest number of bytes transmitted or received, in decreasing order. Click the horizontal bar to display the details of the selected host.

By OS — Displays the number of hosts that are running each type of OS. Click the OS area in the donut chart to display the hosts running the selected OS type.

By Role — Displays the number of hosts with individual roles. Click the role area in the donut chart to display the hosts of the selected role.