End-of-Life (EoL)

ACC Tabs

  • Network Activity
    —Displays an overview of traffic and user activity on your network. It focuses on the top applications being used, the top users who generate traffic with a drill down into the bytes, content, threats or URLs accessed by the user, and the most used security rules against which traffic matches occur. In addition, you can also view network activity by source or destination zone, region, or IP address, by ingress or egress interfaces, and by host information such as the operating systems of the devices most commonly used on the network.
  • Threat Activity
    —Displays an overview of the threats on the network. It focuses on the top threats—vulnerabilities, spyware, viruses, hosts visiting malicious domains or URLs, top WildFire™ submissions by file type and application, and applications that use non-standard ports. The Compromised Hosts widget supplements detection with better visualization techniques. It uses the information from the correlated events tab (Monitor > Automated Correlation Engine > Correlated Events) to present an aggregated view of compromised hosts on your network by source users or IP addresses, sorted on severity.
  • Blocked Activity
    —Focuses on traffic that was prevented from coming into the network. The widgets in this tab allow you to view activity denied by application name, user name, threat name, content (files and data), and the top security rules with a deny action that blocked traffic.
  • Mobile Network Activity
    —Displays a visual representation of mobile traffic on your network using GTP logs generated from your security policy rule configuration. It includes interactive and customizable GTP Events, Mobile Subscriber Activity and GTP Rejection Cause widgets to which you can apply ACC Filters and drill down to isolate the information you need.
  • Tunnel Activity
    —Displays the activity of tunnel traffic that the firewall inspected based on your tunnel inspection policies. Information includes tunnel usage based on tunnel ID, monitor tag, user, and tunnel protocols such as Generic Routing Encapsulation (GRE), General Packet Radio Service (GPRS) Tunneling Protocol for User Data (GTP-U), and non-encrypted IPSec.
You can also customize tabs and widgets as described in Working with Tabs and Widgets.

Recommended For You