Use Case: Monitor Applications Using Panorama
This example takes you through the process of assessing the efficiency of your current policies and determining where you need to adjust them to fortify the acceptable use policies for your network.
When you log in to Panorama, the Top Applications widget on the Dashboard gives a preview of the most used applications over the last hour. To display the widget, select WidgetsApplicationTop Applications in the toolbar. You can either glance over the list of top applications and mouse over each application block for which you want to review the details, or you can select the ACC tab to view the same information as an ordered list. The following image is a view of the Top Applications widget on the Dashboard.
The data source for this display is the application statistics database; it does not use the Traffic logs and is generated whether or not you have enabled logging for security rules. This view into the traffic on your network depicts everything that is allowed on your network and is flowing through unblocked by any policy rules that you have defined.
In the ACC tab, you can select and toggle the Data Source to be local on Panorama or you can query the managed firewalls (Remote Device Data) for the data; Panorama automatically aggregates and displays the information. For a speedier flow, consider using Panorama as the data source (with log forwarding to Panorama enabled) because the time to load data from the managed firewalls varies by the time period for which you choose to view data and the volume of traffic that is generated on your network. If your managed firewalls have a combination of PAN-OS 7.0 and earlier versions, Remote Device Data is not available.
The Dashboard example in Figure 1 shows BitTorrent as a popular application. If you click the BitTorrent application block, Panorama opens the ACCNetwork Activity tab with BitTorrent applied as a global filter and shows information on the application, users who accessed the application, and the details on the risk level and characteristics of the application.
In the User Activity widget, you can see how many users are using BitTorrent and the volume of traffic being generated. If you have enabled User-ID, you can view the names of the users who are generating this traffic, and drill in to review all the sessions, content or threats associated with each user.
In the Threat Activity tab, view the Compromised Hosts widget to see what correlation objects were matched on, and view the match evidence associated with the user and application. You can also view the threat name, category and ID in the Threat Activity widget.
With BitTorrent set as a global filter, use the Destination IP Activity and the Destination Regions widgets to verify where the traffic was destined. You can also view the ingress and egress zones and the security rule that is letting this connection through.
For more detailed information, jump into the Traffic logs for a filtered view and review each log entry for ports used, packets sent, bytes sent and received. Adjust the columns to view more information or less information based on your needs.
The MonitorApp-Scope> Traffic Map tab displays a geographical map of the traffic flow and provides a view of incoming versus outgoing traffic. You can also use the MonitorApp-ScopeChange Monitor tab to view changes in traffic patterns. For example, compare the top applications used over this hour to the last week or month to determine if there is a pattern or trend.
With all the information you have now uncovered, you can evaluate what changes to make to your policy configurations. Here are some suggestions to consider:
- Be restrictive and create a pre-rule on Panorama to block all BitTorrent traffic. Then use Panorama device groups to create and push this policy rule to one or more firewalls.
- Enforce bandwidth use limits and create a QoS profile and policy rule that de-prioritizes non-business traffic. Use Panorama device groups and templates to configure QoS and then push rules to one or more firewalls.
- Reduce risk to your network assets and create an application filter that blocks all file sharing applications that are peer-to-peer technology with a risk factor of 4 or 5. Make sure to verify that the BitTorrent application is included in that application filter, and will therefore be blocked.
- Schedule a custom report group that pulls together the activity for the specific user and that of top applications used on your network to observe that pattern for another week or two before taking action.
Besides checking for a specific application, you can also check for any unknown applications in the list of top applications. These are applications that did not match a defined App-ID™ signature and display as unknown-udp and unknown-tcp. To delve into these unknown applications, click on the name to drill down to the details for the unclassified traffic.
Use the same process to investigate the top source IP addresses of the hosts that initiated the unknown traffic along with the IP address of the destination host to which the session was established. For unknown traffic, the traffic logs, by default, perform a packet capture (pcap) when an unknown application is detected. The green arrow in the left column represents the packet capture snippet of the application data. Clicking on the green arrow displays the pcap in the browser.
Having the IP addresses of the servers (destination IP), the destination port, and the packet captures, you will be better positioned to identify the application and make a decision on how you would like to take action on your network. For example, you can create a custom application that identifies this traffic instead of labeling it as unknown TCP or UDP traffic. Refer to the article Identifying Unknown Applications for more information on identifying unknown application and Custom Application Signatures for information on developing custom signatures to discern the application.
ACC Tabs Network Activity —Displays an overview of traffic and user activity on your network. It focuses on the top applications being used, the top ...
Monitor the Network with the ACC and AppScope
Monitor the Network with the ACC and AppScope Both the ACC and the AppScope allow you to monitor and report on the data recorded from ...
ACC Tabs The ACC includes the following predefined tabs for viewing network activity, threat activity, and blocked activity. Tab Description Network Activity Displays an overview ...
Widget Descriptions Each tab on the ACC includes a different set of widgets. Widget Description Network Activity —Displays an overview of traffic and user activity ...
Use Case: ACC—Path of Information Discovery
Use Case: ACC—Path of Information Discovery The ACC has a wealth of information that you can use as a starting point for analyzing network traffic. ...
What Data Center Traffic to Log and Monitor
The types of data center traffic you should log and monitor, the tools you can use to analyze the traffic, and how to best utilize ...
Assess Network Traffic
Assess Network Traffic Now that you have a basic security policy, you can review the statistics and data in the Application Command Center (ACC), traffic ...
A First Glance at the ACC
A First Glance at the ACC The following table shows the ACC tab and describes each component. A First Glance at the ACC 1 Tabs ...
Dashboard Widgets By default, the Dashboard displays widgets in a Layout of 3 Columns but you can customize the Dashboard to display only 2 Columns ...