Perform the following task to view activity
of inspected tunnels.
and select a
Select Tunnel Activity.
Select a Time period to view, such as Last 24 Hrs or
Last 30 Days.
For Global Filters, click the + or - buttons to use ACC
Filters on tunnel activity.
View inspected tunnel activity; you can display and sort
data in each window by
. Each window displays a different
aspect of tunnel data in graph and table format:
Tunnel ID Usage
protocol lists the Tunnel IDs of tunnels using that protocol. Tables provide
totals of Bytes, Sessions, Threats, Content, and URLs for the protocol. Hover
over the tunnel ID to get a breakdown per tunnel ID.
Tunnel Monitor Tag
—Each tunnel protocol
lists tunnel monitor tags of tunnels using that tag. Tables provide
totals of Bytes, Sessions, Threats, Content, and URLs for the tag
and for the protocol. Hover over the tunnel monitor tag to get a
breakdown per tag.
Tunneled Application Usage
categories graphically display types of applications grouped into media,
general interest, collaboration, and networking, and color-coded
by their risk. The Application tables also include a count of users
Tunneled User Activity
graph of bytes sent and bytes received, for example, along an x-axis of
date and time. Hover over a point on the graph to view data at that
point. The Source User and Destination User table provides data
Tunneled Source IP Activity
graphs and tables of bytes, sessions, and threats, for example,
from an Attacker at an IP address. Hover over a point on the graph
to view data at that point.
Tunneled Destination IP Activity
graphs and tables based on destination IP addresses. View threats
per Victim at an IP address, for example. Hover over a point on
the graph to view data at that point.