helps you understand the traffic traversing your network, including
source to destination flows, and all the users and IP addresses
generating traffic. This data helps to decide if you need to refine
traffic attributes (source and destination security zone, the source and
destination IP address, the application, and the user) in your security
rules.