Insight Report Categories

This section provides detailed information about each of the report types and their associated widgets available for each Insight Report category. The Insight report templates are organized into categories, where each category has multiple report types that each contain a unique set of report data.

The following sections describe each report category, including the available reports within each category, and the contents of each report.

Custom Reports

If you imported a custom report template via the Reports > Custom Reports page, you can select the Custom Reports option on the Reports > Configuration page to create a new custom report based upon that template. You can edit a custom report definition to add filters supported by that custom template type, and select raw data columns to appear in the CSV Comma-Separated Values. A file format that stores tabular data in the plain text format separated by commas. format output for that report. Note that the Custom option does not appear in the Reports> Configuration page unless you have previously uploaded a custom report template.

 

Log files for custom report events are separate from other Insight event log files, and are located at /var/avenda/tips/insight/admin/customreports/upload_logs.txt.

Authentication Category Reports

The reports available in the Authentication category described in Table 1 provide the list of authentications that occurred during the report duration.

Additional authentication statistics are displayed on the Authentication Dashboard. For more information, see Authentication Dashboard.

Table 1: Authentication Category Reports

Report Type Report Widgets

Accounting—Bandwidth and Session

 

Provides the statistics using the accounting data generated during report duration. This report allows you to filter the report data by:

Policy Manager server

Network access device IP address

Device category

Device family

Device name

SSID Service Set Identifier. SSID is a name given to a WLAN and is used by the client to access a WLAN network.

Endpoint IP address

User name

 

This report type includes the following bandwidth and session information:

Bandwidth Statistics: Total Bandwidth, Average Bandwidth, Maximum Bandwidth, Maximum Upstream Bandwidth, Maximum Downstream Bandwidth, Sessions, Maximum Duration, Users, Endpoints

Upstream Bandwidth and Downstream Bandwidth Trend

Total Bandwidth and Average Bandwidth Trend

Average Session Time Trend

Unique Session Trend

Top 10 Device Categories with Most Bandwidth Consumed

Top 10 Device Categories with Most Sessions

Top 10 Device Categories with Most Duration

Top 10 Device Families with Most Bandwidth Consumed

Top 10 Device Families with Most Sessions

Top 10 Device Families with Most Duration

Top 10 Endpoints with Most Bandwidth Consumed

Top 10 Endpoints with Most Sessions

Top 10 Endpoints with Most Duration

Top 20 Users with Most Bandwidth Consumed

Top 10 Users with Most Sessions

Top 10 Users with Most Duration

Domain Summary: Provides an overview of authentications per domain.

Authentication by Authentication Source

 

Provides the statistics for successful and failed authentications per authentication source.

This report type includes the following information:

Authentication Statistics

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution Across Authentication Source

Authentication Distribution Across Authorization Source

Authentication Distribution Across Authentication Source

NOTE: This report allows you to filter the report data by authentication source.

Authentication by Policy Manager

 

Provides the statistics for successful and failed authentications per Policy Manager servers in a cluster.

 

This report type includes the following information:

Authentication Statistics

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution—Error Types

Authentication Distribution Across Service

Top 10 Policy Manager with Most Authentications

Top 10 Policy Manager with Most Failed Authentications

Top 10 Policy Manager with Most MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. Address Authentications

Top 10 Policy Manager with Most Users

NOTE: This report allows you to filter the report data by ClearPass Policy Manager server.

Authentication Overview

Provides statistics in general for the report duration, such as total authentications per day, unique devices authentications trend by day, unique users authentication trend by day, authentication distribution based on authentication status, service, Policy Manager server, SSID, VLAN Virtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN., enforcement profile, authentication source, and top 10 users with most authentications, and so on.

 

This report type includes the following information:

Authentication Statistics

Total Authentication Trend

Authentication Status Trend

Unique Devices Authentication Trend

Unique Users Authentication Trend

Authentication Distribution Across Authentication Status

Authentication Distribution Across Cluster

Authentication Distribution Across Service

Authentication Distribution Across VLAN

Authentication Distribution Across SSID

Authentication Distribution Across Enforcement Profiles

Authentication Distribution Across Role

Authentication Distribution Across Authentication Source

Top 10 Users with Most Authentications

Top 10 MAC Addresses with Most Authentications

Top 10 Services with Most Authentications

Top 10 Authentication Sources with Most Authentications

Top 10 Policy Manager Roles Assigned

Top 10 Authorization Sources

Top 20 NADs with Most Authentications

Top 10 Enforcement Profiles Users

NOTE: This report allows you to filter the report data by ClearPass Policy Manager host name, Network Attached Device (NAD Network Access Device. NAD is a device that automatically connects the user to the preferred network, for example, an AP or an Ethernet switch.) IP address, SSID, and Error Code.

Authentication Trend

 

Provides authentication trend statistics for today and yesterday, today and the same day a week ago, and so on.

 

This report type includes the following information:

Authentication Statistics

Total Authentication Trend

Authentication Trend for Today and Yesterday

Authentication Trend for Today and Same Day Week Ago

Total Authentication for 1 Month (per month)

NOTE: This report allows you to filter the report data by ClearPass Policy Manager host name, Network Access Device (NAD) IP address, and SSID.

Failed Authentication

 

Provides statistics based on failed authentications.

This report type includes the following information:

Error Statistics

Failed Authentication Trend

Authentication Distribution—Error Types

Failed Authentication Distribution across Service

Failed Authentication Distribution across Authentication Source

Top 10 Errors with Most Failed Authentications

Top 20 NADs with Most Failed Authentications

Top 10 Policy Manager Servers with Most Failed Authentications

Top 10 Users with Most Failed Authentications

Top 10 Endpoints with Most Failed Authentications

Top 10 Services with Most Failed Authentications

NOTE: This report allows you to filter the report data by ClearPass Policy Manager host name, Network Access Device (NAD) IP address, SSID, and Error Code.

Unique Failed Authentication

 

Provides statistics based on failed authentications.

This report type includes the following information:

Error Statistics

Failed Authentication Trend

Authentication Distribution—Error Types

Failed Authentication Distribution across Service

Failed Authentication Distribution across Authentication Source

Top 10 Errors with Most Failed Authentications

Top 20 NADs with Most Failed Authentications

Top 10 Policy Manager Servers with Most Failed Authentications

Top 10 Users with Most Failed Authentications

Top 10 Endpoints with Most Failed Authentications

Top 10 Services with Most Failed Authentications

NOTE: This report allows you to filter the report data by ClearPass Policy Manager host name, Network Access Device (NAD) IP address, SSID, and Error Code.

Endpoint Category Reports

The Endpoint category provides information on endpoints discovered during the report duration. The reports available in the Endpoint category described in Table 2 contain data that can also be found in the endpoints widgets on the Endpoints Dashboard page. For additional information about the Endpoints Dashboard, see Endpoints Dashboard.

Table 2: Endpoint Category Reports

Report Type Report Widgets

Active Endpoint Security

This report contains the following information:

Endpoint Status

Endpoint Spoofing count

IP Statistics

Device Category

Device category breakdown for devices that are active within a given timestamp

Endpoint Authentication Overview

 

This report type includes the following information for all endpoint types:

Endpoint Statistics

Endpoints Distribution Across Device Category

Endpoints Distribution Across Device Family

Endpoints Distribution Across Device Name

Top 10 Users with Most Endpoints

Top 10 Device Categories with Most Endpoints

Top 10 Device Names with Most Endpoints

Top 10 Device Families with Most Endpoints

NOTE: This report also allows you to filter the report data by Network Access Device (NAD) IP address, Device Category, Device Family, Device name, and SSID.

Endpoint Overview

This report type includes the following information for all endpoint types:

Top 10 Reports Time to Run 30 Days

Top 10 Reports Last 30 Days

Guest—Endpoint Overview

 

This report type includes the following information for endpoints using Guest Authentication:

Endpoint Statistics

Endpoints Distribution Across Device Category

Endpoints Distribution Across Device Family

Endpoints Distribution Across Device Name

Top 10 Users with Most Endpoints

Top 10 Device Categories with Most Endpoints

Top 10 Device Names with Most Endpoints

Top 10 Device Families with Most Endpoints

NOTE: This report also allows you to filter the report data by Network Access Device (NAD) IP address, Device Category, Device Family, Device name, and SSID.

Idle Endpoint Security

This report includes the known endpoints that are not updated within a given timestamp.

RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. —Endpoint Overview

 

This report type includes the following information for endpoints using RADIUS authentication:

Endpoint Statistics

Endpoints Distribution Across Device Category

Endpoints Distribution Across Device Family

Endpoints Distribution Across Device Name

Top 10 Users with Most Endpoints

Top 10 Device Categories with Most Endpoints

Top 10 Device Names with Most Endpoints

Top 10 Device Families with Most Endpoints

NOTE: This report also allows you to filter the report data by Network Access Device (NAD) IP address, Device Category, Device Family, Device name, and SSID.

Guest Authentication Category Reports

The reports available in the Guest Authentication category described in Table 3 provide statistics based on Guest authentications from the Guest database. The statistics for authentication trend and usage for guest users are drawn from the accounting data.

Additional authentication statistics are displayed on the Guest Dashboard. For additional information about the Guest Dashboard, see Guest Dashboard.

Table 3: Guest Authentication Category Reports

Report Type Report Widgets

Guest—Auth Overview

This report includes the following report widgets:

Authentication Statistics

Total Authentication Trend

Authentication Status Trend

Unique Devices Authentication Trend

Unique Guests Authentication Trend

Authentication Distribution Across Authentication Status

Authentication Distribution Across Cluster

Authentication Distribution Across Service

Authentication Distribution Across VLAN

Authentication Distribution Across SSID

Authentication Distribution Across Enforcement Profiles

Authentication Distribution Across Roles

Authentication Distribution Across Authentication Source

Top 10 Guests with Most Authentications

Top 10 MAC Addresses with Most Authentications

Top 10 IPs with Most Authentications

Top 10 Services with Most Authentications

Top 10 Authentication Sources with Most Authentications

Top 10 ClearPass Roles Assigned

Top 10 Authorization Sources with Most Authentications

Top 20 NADs with Most Authentications

Top 10 Enforcement Profiles Used

NOTE: This report also allows you to filter the report data by Policy Manager host name and Network Access Device (NAD) IP address.

Guest—Auth Trend

This report includes the following report widgets:

Authentication Statistics

Total Authentication Trend

Authentication Trend for Today and Yesterday

Authentication Trend for Today and Same Day Week Ago

Total Authentication for One Month

Sponsor List

NOTE: This report also allows you to filter the report data by ClearPass Policy Manager host name and Network Access Device (NAD) IP address.

Guest—Auth by Policy Manager

This report type includes the following information guest authentications by Policy Manager:

Authentication Statistics

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution—Error Types

Authentication Distribution Across Service

Top 10 Policy Manager with Most Authentications

Top 10 Policy Manager with Most Failed Authentications

Top 10 Policy Manager with Most MAC Authentications

Top 10 Policy Manager with Most Guests

NOTE: This report also allows you to filter the report data by ClearPass Policy Manager host name.

Guest - Hotspot Hotspot refers to a WLAN node that provides Internet connection and virtual private network (VPN) access from a given location. A business traveler, for example, with a laptop equipped for Wi-Fi can look up a local hotspot, contact it, and get connected through its network to reach the Internet.

This report includes the following information about hotspot user logins recorded over the selected time frame:

Hotspot plan distribution (for example, free vs hourly paid access)

Purchase amount distribution: purchase totals per plan type, in either dollars or the currency used to purchase the plan.

Guest—Social Login

This report type includes the following information for guest authentication for Social Logins:

Social Authentication Trend

Endpoint Distribution Across Social Providers

Authentication Distribution Across Authentication Source

NOTE: This report also allows you to filter the report data by Policy Manager host name and Network Access Device (NAD) IP address.

Guest Accounting—Bandwidth and Session

 

This report allows you to filter the report data by:

Policy Manager server

Network access device IP address

Device category

Device family

Device name

SSID

Endpoint IP address

User name

This report type includes the following bandwidth and session information:

Bandwidth Statistics: Total Bandwidth, Average Bandwidth, Maximum Bandwidth, Maximum Upstream Bandwidth, Maximum Downstream Bandwidth, Sessions, Maximum Duration, Guests, Endpoints

Upstream Bandwidth and Downstream Bandwidth Trend

Total Bandwidth and Average Bandwidth Trend

Average Session Time Trend

Unique Session Trend

Top 10 Device Categories with Most Bandwidth Consumed

Top 10 Device Categories with Most Sessions

Top 10 Device Categories with Most Duration

Top 10 Device Families With Most Bandwidth Consumed

Top 10 Device Families With Most Sessions

Top 10 Device Families With Most Duration

Top 10 Endpoints with Most Bandwidth Consumed

Top 10 Endpoints with Most Sessions

Top 10 Endpoints with Most Duration

Top 20 Guests with Most Bandwidth Consumed

Top 10 Guests with Most Sessions

Top 10 Guests with Most Duration

Guest Devices—Due to Expire

The Guest Devices—Expired report lets you view information about devices that are due to expire within the selected report period.

This report type includes the following report widgets:

Guest Expiry Statistics

Guest Expiry List (MAC Address and Device Name)

Guest Users and Devices—Due to Expire

The Guest Users and Devices—Expired report lets you view information about guest accounts and devices that are due to expire within the selected report period.

This report type includes the following report widgets:

Guest Expiry Statistics

Guest Expiry List (MAC Address and Visitor Name)

Guest Users—Due to Expire

The Guest Users—Expired report lets you view information about guest accounts due to expire within the selected report period.

This report type includes the following report widgets:

Guest Expiry Statistics

Guest Expiry List

Licensing Reports

The licensing report category allows you to generate a report about license usage over the selected time period. Similar information can also be found in the Licensing widgets on the Licensing Dashboard. For additional information, see Licensing Dashboard.

Table 4: Licensing Report Content

Report Type Report Widgets

License Usage

 

This report type includes the following licensing information:

License statistics, including the total number of licenses, and the number of licenses used for each license type

Number of unique endpoints on the network over the selected time period

Number of Policy Manager Access, Entry, OnGuard or Onboard licenses used over the selected time period.

Policy Manager licenses distribution (available vs used)

Policy Manager license usage per host

Network Category Reports

The reports available in the Network category described in Table 5 contain data about network access devices and gives details on authentication trends such as successful and failed authentications on a per-day basis.

Similar information can also be found in the Network widgets on the Network Dashboard. For additional information, see Licensing Dashboard.

Table 5: Network Category Reports

Report Type Report Widgets

Authentication by NAD

This report type includes the following information for Network Access Devices (NADs) using guest authentication.

Authentication Statistics

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution Across NAD Ports

Top 20 NADs with Most Authentication

Top 10 Services with Most Authentications

Top 20 NADs with Most Failed Authentications

Top 20 NADs with Most MAC Addresses

Top 20 NADs with Most Users

NOTE: This report also allows you to filter the report data by NAD IP address.

Guest—Authentication by NAD

This report type includes the following information for Network Access Devices (NADs) using guest authentication

Authentication Statistics

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution Across NAD Ports

Top 20 NADs with Most Authentication

Top 10 Services with Most Authentications

Top 20 NADs with Most Failed Authentications

Top 20 NADs with Most MAC Addresses

Top 20 NADs with Most Guests

NOTE: This report also allows you to filter the report data by NAD IP address.

RADIUS—Auth by NAD

This report type includes the following information for Network Access Devices (NADs) using guest authentication:

Authentication Statistics

Authentication Distribution Across NAD Ports

Top 20 NADs with Most Authentication

Top 10 Services with Most Authentications

Top 20 NADs with Most Failed Authentications

Top 20 NADs with Most MACs

Top 20 NADs with Most Users

NOTE: This report also allows you to filter the report data by NAD IP address.

OnGuard Category Reports

The reports available in the OnGuard category provide analysis on the devices' posture and health status. These widgets contain data that can also be found in the Posture widgets on the Posture Dashboard. For additional information, see Posture Dashboard.

Table 6: OnGuard Category Reports

Report Type Report Widgets

Apple Mac Endpoint Posture

 

This report type includes the following posture information for Apple/Macintosh endpoints:

OnGuard Statistics

OnGuard Device Authentication Trend

OnGuard Device Distribution Across Health Status

Antispyware Product Name

Antispyware Dat File Version

Antispyware Engine Version

OnGuard Device Distribution Across Antispyware Real-Time Protection Status

Antispyware Version

Antivirus Product Name

Antivirus Dat File Version

Antivirus Engine Version

OnGuard Device Distribution Across Antivirus RealTimeProtection Status

Antivirus Version

Disk Encryption Product Name

Disk Encryption Version

Firewall Firewall is a network security system used for preventing unauthorized access to or from a private network. Product Name

OnGuard Device Distribution Across Firewall Status

Firewall Version

OnGuard Device Distribution Across Network Connection Type

OnGuard Device Distribution Across P2P Application Name

OnGuard Device Distribution Across P2P Status

OnGuard Device Distribution Across Patch Agent Name

Missing Patches Count

OnGuard Device Distribution Across Patch Agent Status

OnGuard Device Distribution Across Client Operating System

OnGuard Device Distribution Across Client Running as VM Virtual Machine. A VM is an emulation of a computer system. VMs are based on computer architectures and provide functionality of a physical computer.

NOTE: This report also allows you to filter the report data by System Posture Token (SPT).

Endpoint Posture Overview

 

This report type includes the following endpoint posture information:

OnGuard Statistics

OnGuard Device Distribution Across Health Status

Unhealthy OnGuard Device Distribution Across Device Family

OnGuard Device Distribution Across Agent Type

OnGuard Device Distribution Across Agent Version

Health Class

Missing Hotfixes

NOTE: This report also allows you to filter the report data by System Posture Token (SPT).

Linux Endpoint Posture

 

This report type includes the following posture information for endpoints using a Linux operating system:

OnGuard Statistics

OnGuard Device Authentication Trend

OnGuard Device Distribution Across Health Status

Antivirus Product Name

Antivirus Dat File Version

Antivirus Engine Version

OnGuard Device Distribution Across Antivirus RealTimeProtection Status

Antivirus Version

NOTE: This report also allows you to filter the report data by System Posture Token (SPT).

Windows Endpoint Posture

 

This report type includes the following posture information for endpoints using a Windows operating system:

OnGuard Statistics

OnGuard Device Authentication Trend

OnGuard Device Distribution Across Health Status

Antispyware Product Name

Antispyware Dat File Version

Antispyware Engine Version

OnGuard Device Distribution Across Antispyware Real-Time Protection Status

Antispyware Version

Antivirus Product Name

Antivirus Dat File Version

Antivirus Engine Version

OnGuard Device Distribution Across Antivirus RealTimeProtection Status

Antivirus Version

Disk Encryption Product Name

Disk Encryption Version

Firewall Product Name

OnGuard Device Distribution Across Firewall Status

Firewall Version

OnGuard Device Distribution Across Network Connection Type

OnGuard Device Distribution Across P2P Application Name

OnGuard Device Distribution Across P2P Status

OnGuard Device Distribution Across Patch Agent Name

Missing Patches Count

OnGuard Device Distribution Across Patch Agent Status

OnGuard Device Distribution Across Client Operating System

OnGuard Device Distribution Across Client Running as VM

NOTE: This report also allows you to filter the report data by System Posture Token (SPT).

Onboard Category Report

The reports available in the Onboard category provides analysis on onboarded devices during the report period, such as the active users and devices count, revoked devices count, onboarded devices distribution based on device type, and Onboard enrollment details.

Table 7: Onboard Report Content

Report Type Report Widgets

Onboard Certificate

 

This report type includes the following certificate information:

Onboard statistics for numbers of revoked devices, active devices, and users

Latest Onboard Device Distribution

Active Onboard Device Distribution

Top 10 Users with Most Active Devices

Onboard Certificate - Due to Expire

This report type includes the following information for manually created certificates due to expire within the selected time frame:

Total number of devices of each device type with certificates due to expire.

Top 10 Users with Most Active Devices

Onboard Enrollment

This report type provides the following information:

Total Devices Onboarded

Onboarded Devices Enrollment Trend

Onboarded Devices

Unique Users and Their Associated Total Number of Devices

Unique Onboarded Devices

RADIUS Authentication Category Reports

The reports available in the RADIUS Authentication provide detailed analysis on authentication trends on successful and failed RADIUS authentication.

Additional authentication statistics are displayed on the Authentication Dashboard. For additional information, see Authentication Dashboard.

Table 8: RADIUS Authentication Category Reports

Report Type Report Widgets

RADIUS—Authentication by Authentication Source

 

This report type includes the following information for RADIUS authentication:

Authentication statistics for numbers and percentages of authentications successes and failures

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution Across Authentication Source

Authentication Distribution Across Authorization Source

Failed Authentication Distribution Across Authentication Source

NOTE: This report also allows you to filter the report data by Policy Manager host name.

RADIUS—Authentication by Policy Manager

 

This report type includes the following information for RADIUS authentication:

Authentication Statistics, including numbers and percentages of authentications successes and failures

Total Authentication Trend

Failed Authentication Trend

Authentication Distribution Error Types

Authentication Distribution Across Service

Top 10 Policy Manager with Most Authentications

Top 10 Policy Manager with Most Failed Authentications

Top 10 Policy Manager with Most MAC Addresses

Top 10 Policy Manager with Most Users

NOTE: This report also allows you to filter the report data by authentication source.

RADIUS—Authentication Overview

 

This report type includes the following information for RADIUS authentication:

Authentication statistics, including numbers and percentages of authentications successes and failures, and numbers of users, endpoints, network devices, roles, Policy Manager servers and enforcement profiles

Total Authentication Trend

Authentication Status Trend

Unique Devices Authentication Trend

Unique Users Authentication Trend

Authentication Distribution Across Auth Status

Authentication Distribution Across Cluster

Authentication Distribution Across Service

Authentication Distribution Across VLAN

Authentication Distribution Across SSID

Authentication Distribution Across Enforcement Profiles

Authentication Distribution Across Role

Authentication Distribution Across Auth Source

Top 10 Users with Most Authentications

Top 10 MACs with Most Authentications

Top 10 Services with Most Authentications

Top 10 Policy Manager Roles Assigned

Top 10 Authorization Sources

Top 20 NADs with Most Authentications

Top 10 Enforcement Profiles Used

NOTE: This report also allows you to filter the report data by ClearPass Policy Manager host name, Network Access Device (NAD) IP address, SSID and authentication service name.

RADIUS—Authentication Trend

 

This report type includes the following information:

Authentication Statistics, including authentication data for the previous day and week

Total Authentication Trend

Authentication Trend for Today and Yesterday

Authentication Trend for Today and Same Day Week Ago

Total Authentication for 1 Month (per month)

NOTE: This report also allows you to filter the report data by ClearPass Policy Manager name, Network Access Device (NAD) IP address, and SSID.

RADIUS—Failed Authentication

 

This report type includes the following information:

Error Statistics

Failed Authentication Trend

Authentication Distribution—Error Types

Failed Authentication Distribution Across Service

Failed Authentication Distribution Across Authentication Sources

Top 10 Errors with Most Failed Authentications

Top 10 Policy Manager Servers with Most Failed Authentications

Top 20 NADs with Most Failed Authentications

Top 10 Users with Most Failed Authentications

Top 10 Endpoints with Most Failed Authentications

Top 10 Services with Most Failed Authentications

NOTE: This report also allows you to filter the report data by ClearPass Policy Manager host name, Network Access Device (NAD) IP, SSID, and Error Code.

System Monitor Category Reports

The reports available in the System Monitor category provide information about system-level events, such as configuration changes performed on the Policy Manager server (configuration audit), license usage, and system events.

Additional system statistics are displayed on the System Monitor Dashboard. For additional information about the System Dashboard, see System Monitor Dashboard.

Table 9: System Monitor Category Reports

Report Type Report Widgets

Configuration Audit

 

This report type includes the following information for each configuration audit record:

Name of change

Action (for example, modify, add, or delete)

Category

Updated by

Update timestamp

System Events

 

This report type includes the following information for each system event :

Policy Manager host name

Source of Event

Event Category

Event Level

Timestamp

Description

NOTE: This report also allows you to filter the report data by Policy Manager host name.

TACACS+ Category Reports

The reports available in the TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS.  category provide TACACS Terminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. + authentication trends such as successful and failed TACACS+ authentication and command authorizations.

Table 10: TACACS+ Reports Content

Report Type Report Widgets

TACACS+—Authentication

 

This report type includes the following TACACS+ information:

TACACS+ statistics, including the numbers and percentages of successful and failed authentications, and the numbers of users, Policy Manager servers, and network devices.

Total Authentication Trend

Authentication Status Trend

Authentication Trend For Today and Yesterday

Command List showing Authentication and Authorization commands

Authentication Distribution Across Authentication Status

Authentication Distribution Across Cluster

Top 10 Errors with Most Failed Authentications

Top 20 NADs with Most Authentication

Top 10 Users with Most Authentications

NOTE: This report also allows you to filter the report data by Policy Manager server and NAD IP address.