Table Of Contents
Status
Device Status Dashboard
Network Status
Status Summary
Traffic Statistics
Usage Reports
WAN Bandwidth Reports
ARP Table
DHCP Bindings
STP Status
CDP Neighbor
Wireless Status (for ISA550W and ISA570W only)
Wireless Status
Client Status
NAT Status
VPN Status
IPsec VPN Status
SSL VPN Status
Active User Sessions
Security Services Reports
Web Security Report
Anti-Virus Report
Email Security Report
Network Reputation Report
IPS Report
Application Control Report
System Status
Processes
Resource Utilization
Status
This chapter describes how to view the status of your security appliance. It includes the following sections:
•
Device Status Dashboard
•
Network Status
•
Wireless Status (for ISA550W and ISA570W only)
•
NAT Status
•
VPN Status
•
Active User Sessions
•
Security Services Reports
•
System Status
To access the Status pages, click Status in the left hand navigation pane.
Device Status Dashboard
Use the Status > Dashboard page to view information about the security appliance and its current settings.
Status > Dashboard
Field
|
Description
|
System Information
|
System Name
|
Unit name of the device.
|
Firmware (Primary/Secondary)
|
Firmware version that the security appliance is currently using (Primary), and the firmware version that was previously running (Secondary). By default, the security appliance boots with the primary firmware.
|
Bootloader Version
|
Bootloader version of the security appliance.
|
Serial Number
|
Serial number of the security appliance.
|
PID
|
Product Identifier (PID) of the security appliance, also known as product name, model name, and product number.
|
UDI
|
Unique Device Identifier (UDI) of the security appliance. UDI is Cisco's product identification standard for hardware products.
|
Resource Utilization
To see complete details for resource utilization, click details.
|
CPU Utilization
|
Current CPU usage.
|
CPU Utilization Over 1 Minute
|
Average CPU usage in last one minute.
|
Memory Utilization
|
Total memory usage after the security appliance boots.
|
System Up Time
|
Duration for which the security appliance has been running.
|
Current Time
|
The current date and system time.
|
Licenses
Displays the status of the security license that is used to activate security services. To manage the security license, click manage.
|
Syslog Summary
Displays the summary of the system event logs. Syslog entries can be of different severity levels. To see complete logs, click details.
|
Emergency
|
Total number of Emergency logs. Click the number link for complete details.
|
Alert
|
Total number of Alert logs. Click the number link for complete details.
|
Critical
|
Total number of Critical logs. Click the number link for complete details.
|
Error
|
Total number of Error logs. Click the number link for complete details.
|
Warning
|
Total number of Warning logs. Click the number link for complete details.
|
Notification
|
Total number of Notification logs. Click the number link for complete details.
|
Information
|
Total number of Information logs. Click the number link for complete details.
|
Debug
|
Total number of Debug logs. Click the number link for complete details.
|
Site-to-Site VPN
Displays the total number of active site-to-site VPN tunnels. To see complete details, click details.
|
Remote Access VPN
|
SSL Users
|
Total number of active SSL VPN users. Click the SSL Users link for complete details.
|
IPsec Users
|
Total number of active IPsec VPN users. Click the IPsec Users link for complete details. This option is only available when the security appliance is acting as an IPsec VPN server.
|
Routing Mode
Displays the routing mode (NAT or Routing) between WAN and LAN. By default, the NAT mode is enabled. To enable or disable the Routing mode, click details.
|
Physical Ports
|
Name
|
Name of the physical port.
|
Port Type
|
Type of the physical port, such as WAN, LAN, or DMZ.
|
Mode
|
Link status of the physical port.
|
WAN Mode
Displays the WAN operation mode, such as Single - WAN1, Failover, or Load Balancing. To see complete details for WAN redundancy, click details.
|
WAN Interface(s)
To see complete details for all WAN ports, click details.
|
Name
|
Name of the WAN port.
|
IP Address
|
IP address for the WAN port.
|
LAN Interfaces
To see complete details for all VLANs, click details.
|
Index
|
ID of the VLAN.
|
Name
|
Name of the VLAN.
|
DHCP Mode
|
DHCP mode of the VLAN.
|
IP Address
|
Subnet IP address of the VLAN.
|
DMZ Interface
To see complete details for all DMZs, click details.
|
Port
|
Configurable port that is set as the DMZ port.
|
Name
|
Name of the DMZ port.
|
IP Address
|
Subnet IP address of the DMZ port.
|
Wireless Interfaces (for ISA550W and ISA570W only)
To see complete details for all SSIDs, click details.
|
SSID Number
|
Number of the SSID.
|
SSID Name
|
Name of the SSID.
|
VLAN
|
VLANs to which the SSID is mapped.
|
Client List
|
Number of client stations that are connected to the SSID.
|
Network Status
Use the Network Status pages to view information for the various interfaces, the network usage reports, the WAN bandwidth reports, all ARP (Address Resolution Protocol) entries, and DHCP address assignment. Refer to the following topics:
•
Status Summary
•
Traffic Statistics
•
Usage Reports
•
WAN Bandwidth Reports
•
ARP Table
•
DHCP Bindings
•
STP Status
•
CDP Neighbor
Status Summary
Use the Status Summary page to view information for the various interfaces.
Status Summary
Field
|
Description
|
Ethernet
|
Port
|
Number of the physical port.
|
Name
|
Name of the physical port.
|
Enable
|
Shows if the physical port is enabled or disabled.
|
Port Type
|
Type of the physical port, such as WAN, LAN, or DMZ.
|
Line Status
|
Shows if the physical port is connected or not.
|
Speed/Duplex
|
Duplex mode (speed and duplex setting) of the physical port.
|
Mode
|
Access mode of the physical port. A WAN or DMZ port is always set to Access mode and a LAN port can be set to Access or Trunk mode.
|
VLAN
|
VLANs to which the physical port is mapped.
|
PVID
|
The Port VLAN ID (PVID) to be used to forward or filter the untagged packets coming into the port. The PVID of a Trunk port is fixed to the DEFAULT VLAN (1).
|
WAN
|
Name
|
Name of the WAN port.
|
WAN Type
|
Network addressing mode used to connect to the Internet for the WAN port.
|
Connection Time
|
Time that the WAN port is connected, in seconds.
|
Connection Status
|
Shows if the WAN port obtains an IP address successfully or not. If yes, the connection status shows "Connected."
|
WAN State
|
Shows if the WAN port is active or inactive for routing. If the WAN port is active for routing, the WAN state shows "Up." If the WAN port is inactive for routing, the WAN state shows "Down."
NOTE: The state "Down" means that the network detection fails. Even though the WAN state is down due to network detection failure, the WAN services (like SSL VPN and Remote Administration) can still be connected except the IPsec VPN Access service.
|
MAC Address
|
MAC address of the WAN port.
|
IP Address
|
IP address of the WAN port that is accessible from the Internet.
|
Subnet Mask/Prefix Length
|
Subnet mask or IPv6 prefix length for the WAN port.
|
Gateway
|
Default gateway for the WAN port.
|
DNS Server
|
DNS server for the WAN port.
|
Physical Port
|
Physical port that is associated with the WAN port.
|
Line Status
|
Shows if the cable is inserted to the WAN port or not. If the line status shows "Not Connected," the cable may be loose or malfunctioning, or be plugged out.
NOTE: If the line status shows "Not Connected," the Connection Status will show "Not Connected" and the WAN State will show "Down."
|
Zone
|
Zone to which the WAN port is assigned.
|
VLAN
|
LAN MAC Address
|
MAC address of the default LAN.
|
Name
|
Name of the VLAN.
|
VID
|
ID of the VLAN.
|
IP Address
|
Subnet IP address of the VLAN.
|
Subnet Mask/Prefix Length
|
Subnet mask or IPv6 prefix length of the VLAN.
|
Physical Port
|
Physical ports that are assigned to the VLAN.
|
Zone
|
Zone to which the VLAN is mapped.
|
DMZ
|
Physical Port
|
Physical port that is assigned to the DMZ.
|
Zone
|
Zone to which the DMZ is mapped.
|
Name
|
Name of the DMZ.
|
VID
|
ID of the VLAN.
|
IP Address
|
Subnet IP address of the DMZ.
|
Subnet Mask/Prefix Length
|
Subnet mask or IPv6 prefix length of the DMZ.
|
Traffic Statistics
Use the Traffic Statistics page to view traffic data for the various interfaces. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data. Click Reset to reset the values in the Ethernet table to zero.
Traffic Statistics
Field
|
Description
|
Ethernet
|
Port
|
Name of the physical port.
|
Link Status
|
Shows if the port is connected or not.
|
Tx Packets
|
Number of IP packets transmitted by the port.
|
Rx Packets
|
Number of IP packets received by the port.
|
Collisions
|
Number of signal collisions that have occurred on this port. A collision occurs when the port tries to send data at the same time as a port on the other router or computer that is connected to this port.
|
Tx Bytes/Sec
|
Number of bytes transmitted by the port per second.
|
Rx Bytes/Sec
|
Number of bytes received by the port per second.
|
Uptime
|
Time that the port has been active. The uptime is reset to zero when the security appliance or the port is restarted.
|
WAN
|
Name
|
Name of the WAN port.
|
Tx Packets
|
Number of IP packets transmitted by the WAN port.
|
Rx Packets
|
Number of IP packets received by the WAN port.
|
Collisions
|
Number of signal collisions that have occurred on this WAN port.
|
Tx Bytes/Sec
|
Number of bytes transmitted by the WAN port per second.
|
Rx Bytes/Sec
|
Number of bytes received by the WAN port per second.
|
Uptime
|
Time that the WAN port has been active. The uptime is reset to zero when the security appliance or the WAN port is restarted.
|
VLAN
|
Name
|
Name of the VLAN.
|
Tx Packets
|
Number of IP packets transmitted by the VLAN.
|
Rx Packets
|
Number of IP packets received by the VLAN.
|
Collisions
|
Number of signal collisions that have occurred on this VLAN.
|
Tx Bytes/Sec
|
Number of bytes transmitted by the VLAN per second.
|
Rx Bytes/Sec
|
Number of bytes received by the VLAN per second.
|
Uptime
|
Time that the LAN port has been active.
|
DMZ
|
Name
|
Name of the DMZ.
|
Tx Packets
|
Number of IP packets transmitted by the DMZ.
|
Rx Packets
|
Number of IP packets received by the DMZ.
|
Collisions
|
Number of signal collisions that occurred on the DMZ.
|
Tx Bytes/Sec
|
Number of bytes transmitted by the DMZ per second.
|
Rx Bytes/Sec
|
Number of bytes received by the DMZ per second.
|
Uptime
|
Time that the DMZ port has been active.
|
Usage Reports
Use the Usage Reports page to view the top 25 websites that have been most frequently visited, the top 25 users of Internet bandwidth by IP address, and the top 25 services and applications that consume the most bandwidth.
STEP 1
In the Data Collection area, enter the following information:
•
Enable Bandwidth Usage Report by IP Address: Check this box to enable the bandwidth usage report sorted by the top 25 IP addresses that consume the most bandwidth.
•
Enable Bandwidth Usage Report by Internet Service: Check this box to enable the bandwidth usage report sorted by the top 25 services and applications that consume the most bandwidth.
•
Enable Website Visits Report: Check this box to enable the website visits report sorted by the top 25 URLs that have been most frequently visited.
STEP 2
Click Save to save your settings.
STEP 3
In the Statistics Report area, choose the desired report from the Type drop-down list to view.
•
Bandwidth Usage by IP Address: This report displays the IP address of the top 25 users who consume the most bandwidth and the sum of bytes received and transmitted per IP address.
•
Bandwidth Usage by Internet Service: This report displays the following information for the top 25 services and applications that consume the most bandwidth:
–
Application: The name for an known service or application or the port number for an unknown service or application. For example, if SMTP (6, 25) is displayed, SMTP is the service name, 6 is the protocol number, and 25 is the port number of the service.
–
Sessions: The total number of sessions for the service or application.
–
Total Bandwidth (TX/RX): The total number of bytes received and transmitted by the service or application during the period.
–
Average Bandwidth (TX/RX): The average number of bytes received and transmitted per second.
This report is helpful to determine whether the services and applications being used are appropriate for your organization. You can block the services and applications that are consuming a large portion of available bandwidth. For information on blocking the applications, see Configuring Application Control, page 309.
•
Website Visits: This report displays the URLs of the top 25 websites that have been most frequently visited and the number of hits to each website.
This report only monitors the website visits through the HTTP port specified in the advanced settings of either Firewall Content Filtering or Web URL Filtering. You can block the websites if inappropriate websites appear in this report. For information on blocking the websites, see Configuring Content Filtering to Control Internet Access, page 281, or Configuring Web URL Filtering, page 327.
STEP 4
Click Refresh to update the data on the screen, or click Reset to reset the values to zero.
•
Statistics Start Time: Displays the time that the report starts collecting the data.
NOTE: When a report is enabled or disabled or if you click Reset, the sample period for the report is reset.
•
Last Refresh Time: Displays the time of your last refresh operation.
WAN Bandwidth Reports
Use the WAN Bandwidth page to view the real-time WAN network bandwidth usage per hour in the past 24 hours. This page is automatically updated every 10 seconds.
STEP 1
To enable the WAN bandwidth reports, check the box next to Collect and Display WAN Bandwidth Statistics.
STEP 2
Click Save to save your settings.
STEP 3
In the Primary WAN tab, you can see the real-time network bandwidth usage per hour in the past 24 hours for the primary WAN port.
STEP 4
In the Secondary WAN tab, you can see the real-time network bandwidth usage per hour in the past 24 hours for the secondary WAN port if a secondary WAN port is configured.
STEP 5
Click Refresh to manually refresh the data.
STEP 6
Click Reset to reset the WAN bandwidth usage data for both the primary WAN and the secondary WAN ports.
ARP Table
Address Resolution Protocol (ARP) is a computer-networking protocol that determines a network host's Link Layer or hardware address when only the Internet Layer (IP) or Network Layer address is known.
Use the ARP Table page to view information for all ARP entries. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
ARP Table
Field
|
Description
|
IP Address
|
IP address of the device.
|
Flag
|
Flag type of the device.
|
MAC Address
|
MAC address of the device, which is associated with the IP address.
|
Device
|
Device interface type.
|
DHCP Bindings
Use the DHCP Bindings page to view information for DHCP address assignment. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
DHCP Bindings
Field
|
Description
|
IP Address
|
IP address assigned to the host or the remote device.
|
MAC Address
|
MAC address of the host or the remote device.
|
Lease Start Time
|
The lease starting time of the IP address.
|
Lease End Time
|
The lease ending time of the IP address.
|
STP Status
Use the STP Status page to view information about VLANs that have Spanning Tree Protocol (STP) enabled. STP is a Link Layer network protocol that ensures a loop-free topology for any bridged LAN. No information is displayed for VLANs without STP enabled.
At the top of the page, use the Check the STP status in this VLAN list to choose a VLAN.
STP Status > Global Status
Field
|
Description
|
Bridge ID
|
An unique ID for the other devices on the network to identify this device.
|
Root Bridge ID
|
The bridge ID of the root bridge.
|
Root Port
|
The Port ID of the root port. The root port is the port with the lowest path cost to the root bridge. The root bridge does not have a root port.
|
Root Path Cost
|
The cost of the shortest path from the security appliance to the root bridge. The value 0 indicates that this security appliance is the root bridge.
|
Interface Status Table
Field
|
Description
|
Interface
|
The interface name.
|
Port Role
|
The role assigned to this port
• Root port: The port with the lowest path cost to the root bridge.
• Designated port: The port with the lowest path cost on a LAN segment. The LAN segment will use the designated port to reach the root bridge.
• Blocked port: The port that is neither a root port nor a designated port.
|
Path Cost
|
The cost of the path to root bridge through this port.
|
Priority
|
Priority of the port.
|
Port State
|
The state of the port:
• Disabled: This port is disabled. It will not transmit or receive any traffic.
• Blocking: This port is enabled but blocked by STP. It will not transmit or receive any traffic.
• Listening: This port will receive and process STP bridge protocol data units (BPDUs), but will not forward any data traffic.
• Learning: This port will start to learn MAC addresses from the received packets. It will also receive and process STP BPDUs, but will not forward any data traffic.
• Forwarding: This port will forward data traffic, process BPDUs and learn MAC address.
|
Designated Bridge ID
|
The ID of the designated bridge of the LAN segment. The designated bridge is used by all the other devices on the LAN segment to reach the root bridge.
|
Designated Port ID
|
The ID of the designated port of the LAN segment. The designated port is the port used by all the other devices on the LAN segment to reach the root bridge.
|
Designated Cost
|
The path cost to the designated bridge of the LAN segment.
|
CDP Neighbor
Use the CDP Neighbors page to view status information about neighboring devices that were discovered by the Cisco Discovery Protocol (if enabled). This information may be useful for troubleshooting.
The information on this page is automatically refreshed at 15-second intervals. If CDP is disabled, a message appears at the top of the page and the list is empty. To enable CDP, see CDP Discovery, page 432.
Field
|
Description
|
Device ID
|
The host name of the neighboring device.
|
Local Port
|
The outgoing port that the security appliance is using for this connection.
|
Duration
|
The time interval (in seconds) that the security appliance will keep CDP information from a neighboring device.
|
Function
|
The neighbor's device type: R - Router, T - Trans Bridge, B - Source Route Bridge, S - Switch, H - Host, I - IGMP, or r - repeater.
|
Platform
|
The model number of the neighboring device.
|
Interface ID
|
The interface that the neighboring device is using for the connection.
|
IP Address
|
The IP address of the neighboring device.
|
Duplex
|
The duplex mode of the connection.
|
Voice VLAN
|
The Voice VLAN ID of the neighboring device.
|
Wireless Status (for ISA550W and ISA570W only)
Use the Wireless Status pages to view information about your wireless network. Refer to the following topics:
•
Wireless Status
•
Client Status
Wireless Status
Use the Wireless Status > Wireless Status page to view the cumulative total of relevant wireless statistics for all SSIDs. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
Wireless Status > Wireless Status
Field
|
Description
|
Wireless Status
|
SSID Number
|
Number of the SSID.
|
SSID Name
|
Name of the SSID.
|
MAC Address
|
MAC address of the SSID.
|
VLAN
|
VLAN to which the SSID is mapped.
|
Client List
|
Number of client stations that are connected to the SSID.
|
Wireless Statistics
|
Name
|
Name of the SSID.
|
Tx Packets
|
Number of transmitted packets on the SSID.
|
Rx Packets
|
Number of received packets on the SSID.
|
Collisions
|
Number of packet collisions reported to the SSID.
|
Tx Bytes/Sec
|
Number of transmitted bytes of information on the SSID.
|
Rx Bytes/Sec
|
Number of received bytes of information on the SSID.
|
Uptime
|
Time that the SSID has been active.
|
Client Status
Use the Wireless Status > Client Status page to view information for all client stations that are already connected to each SSID. The MAC address and IP address for all connected client stations for each SSID are displayed. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
NAT Status
Use the NAT Status page to view information for all NAT rules.
NAT Status
Field
|
Description
|
Original Source Address
|
Original source IP address in the packet.
|
Original Destination Address
|
Original destination IP address in the packet.
|
Source Port
|
Source interface that traffic comes from.
|
Destination Port
|
Destination interface that traffic goes to.
|
Translated Destination Address
|
IP address that the specified original destination address is translated to.
|
Translated Source Address
|
IP address that the specified original source address is translated to.
|
Translated Destination Port
|
Interface that the specified destination interface is translated to.
|
Translated Source Port
|
Interface that the specified source interface is translated to.
|
Tx Packets
|
Number of transmitted packets.
|
Rx Packets
|
Number of received packets.
|
Tx Bytes/Sec
|
Volume in bytes of transmitted traffic.
|
Rx Bytes/Sec
|
Volume in bytes of received traffic.
|
VPN Status
Use the VPN Status pages to view information for all VPN sessions. Refer to the following topics:
•
IPsec VPN Status
•
SSL VPN Status
IPsec VPN Status
Use the VPN Status > IPsec VPN Status page to view information for all IPsec VPN sessions. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
VPN Status > IPsec VPN Status
Field
|
Description
|
Active Sessions
To manually terminate an active IPsec VPN session, click the Disconnect icon in the Connect column. To manually terminate multiple active IPsec VPN sessions, check them and click the Disconnect button.
If an IPsec VPN session is terminated, you can manually establish the VPN connection by clicking the Connect icon in the Connect column.
|
Name
|
VPN policy used for an IPsec VPN session.
|
Status
|
Connection status for an IPsec VPN session.
|
VPN Type
|
VPN connection type for an IPsec VPN session, such as Site-to-Site, IPsec Remote Access, or Teleworker VPN Client.
|
WAN Interface
|
WAN port used for an IPsec VPN session.
|
Remote Gateway
|
IP address of the remote peer.
NOTE: For a site-to-site VPN session, it displays the IP address of the remote gateway. For an IPsec VPN session between the Teleworker VPN client and a remote IPsec VPN server, it displays the IP address of the IPsec VPN server. For an IPsec VPN session between the IPsec VPN server and a remote VPN client, it displays the IP address of the remote VPN client.
|
Local Network
|
Subnet IP address and netmask of your local network.
|
Remote Network
|
Subnet IP address and netmask of the remote network.
|
Statistics
|
Name
|
VPN policy used for an IPsec VPN session.
|
VPN Type
|
VPN connection type for an IPsec VPN session.
|
WAN Interface
|
WAN port used for an IPsec VPN session.
|
Remote Gateway
|
IP address of the remote peer.
|
Local Network
|
Subnet IP address and netmask of your local network.
|
Remote Network
|
Subnet IP address and netmask of the remote network.
|
Tx Bytes
|
Volume of traffic in kilobytes transmitted from the VPN tunnel.
|
Rx Bytes
|
Volume of traffic in kilobytes received from the VPN tunnel.
|
Tx Packets
|
Number of IP packets transmitted from the VPN tunnel.
|
Rx Packets
|
Number of IP packets received from the VPN tunnel.
|
Teleworker VPN Client
If the Teleworker VPN Client feature is enabled and the security appliance is acting as a Cisco VPN hardware client, the following information is displayed.
|
Status
|
Shows if the Teleworker VPN Client feature is enabled or disabled.
|
Primary DNS
|
IP address of the primary DNS server.
|
Secondary DNS
|
IP address of the secondary DNS server.
|
Primary WINS
|
IP address of the primary WINS server.
|
Secondary WINS
|
IP address of the secondary WINS server.
|
Default Domain
|
Default domain name.
|
Split Tunnel
|
IP address and netmask for the specified split subnets.
|
Split DNS
|
IP address or domain name for the specified split DNS.
|
Backup Server 1/2/3
|
IP address or hostname for the specified backup servers.
|
SSL VPN Status
Use the VPN Status > SSL VPN Status page to view information for all active SSL VPN sessions. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
VPN Status > SSL VPN Status
Field
|
Description
|
Active Sessions
To manually terminate an active SSL VPN session, click the Disconnect icon in the Configure column. To manually terminate multiple active SSL VPN sessions, check them and click the Disconnect button.
|
Session ID
|
ID of the SSL VPN session.
|
User Name
|
Name of the connected SSL VPN user.
|
Client IP (Actual)
|
Actual IP address used by the SSL VPN client.
|
Client IP (VPN)
|
Virtual IP address of the SSL VPN client assigned by the SSL VPN gateway.
|
Connect Time
|
Amount of time since the SSL VPN user first established the connection.
|
SSL VPN Statistics
In the Global Status area, the global statistic information is displayed. To clear the global statistic information, click Clear.
|
Active Users
|
Total number of connected SSL VPN users.
|
In CSTP Frames
|
Number of CSTP frames received from all clients.
|
In CSTP Bytes
|
Total number of bytes in the CSTP frames received from all clients.
|
In CSTP Data
|
Number of CSTP data frames received from all clients.
|
In CSTP Control
|
Number of CSTP control frames received from all clients.
|
Out CSTP Frames
|
Number of CSTP frames sent to all clients.
|
Out CSTP Bytes
|
Total number of bytes in the CSTP frames sent to all clients.
|
Out CSTP Data
|
Number of CSTP data frames sent to all clients.
|
Out CSTP Control
|
Number of CSTP control frames sent to all clients.
|
In the Session Statistics table, the following information for each SSL VPN session is displayed.
To clear the statistic information for a single SSL VPN session, click Clear in the Configure column. To clear the statistic information for multiple SSL VPN sessions, check them and click -Clear.
|
Session ID
|
ID of the SSL VPN session.
|
In CSTP Frames
|
Number of CSTP frames received from the client.
|
In CSTP Bytes
|
Total number of bytes in the CSTP frames received from the client.
|
In CSTP Data
|
Number of CSTP data frames received from the client.
|
In CSTP Control
|
Number of CSTP control frames received from the client.
|
Out CSTP Frames
|
Number of CSTP frames sent to the client.
|
Out CSTP Bytes
|
Total number of bytes in the CSTP frames sent to the client.
|
Out CSTP Data
|
Number of CSTP data frames sent to the client.
|
Out CSTP Control
|
Number of CSTP control frames sent to the client.
|

NOTE
CSTP is a Cisco proprietary protocol for SSL VPN tunneling. "In" represents that the packet comes from the client. "Out" represents that the packet is sent to the client. The client is the PC running the Cisco AnyConnect Secure Mobility Client software that connects to the security appliance running the SSL VPN server. A CSTP frame is a packet that carrying CSTP protocol information. There are two major frame types, control frames and data frames. Control frames implement control functions within the protocol. Data frames carry the client data, such as the tunneled payload.
Active User Sessions
Use the Active User Sessions page to view information for all active user sessions that are currently logged into the security appliance. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data. Click the Logout icon to terminate a web login user session or a VPN user session.
Active User Sessions
Field
|
Description
|
User Name
|
Name of the logged user.
|
IP Address
|
Host IP address from which the user accessed the security appliance.
|
Login Method
|
How the user logs into the security appliance, such as WEB, SSL VPN, IPsec Remote Access, or Captive Portal.
|
Session Time
|
Time that the user has logged into the security appliance.
|
Security Services Reports
Use the Security Services Reports pages to view the reports for all security services. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data. Refer to the following topics:
•
Web Security Report
•
Anti-Virus Report
•
Email Security Report
•
Network Reputation Report
•
IPS Report
•
Application Control Report
NOTE
The security services reports are only active when the security license is validated. Before you choose a security service report to view, make sure that the corresponding security service is enabled.
Web Security Report
This report displays the number of web access requests logged and the number of websites blocked by Web URL Filtering, Web Reputation Filtering, or both.
STEP 1
In the Web Security tab, specify the following information:
•
Enable: Check this box to enable the web security report, or uncheck this box to disable it.
•
Blocked Requests: Check this box to display the number of websites blocked by Web URL Filtering and/or Web Reputation Filtering in the graph. To view more information about blocked requests, click the red bar in the graph. A pop-up window displays the following information for each blocked request: the date and the time, the IP address and the MAC address of the host that initiated the request, the web site, the blocked URL, the filter that blocked the request, and the number of times that the connection was blocked.
•
Processed Requests: Check this box to display the number of web access requests logged by Web URL Filtering and/or Web Reputation Filtering in the graph.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of web access requests processed and total number of websites blocked since the Web URL Filtering and Web Reputation Filtering services were activated.
|
Total Last 7 Days
|
Total number of web access requests processed and total number of websites blocked in last seven days.
|
Total Today
|
Total number of web access requests processed and total number of websites blocked in one day.
|
Graph
|
Total number of web access requests processed and total number of websites blocked per day in last seven days.
|
Anti-Virus Report
This report displays the number of files checked and the number of viruses detected by the Anti-Virus service.
STEP 1
In the Anti-Virus tab, specify the following information:
•
Enable: Check this box to enable the Anti-Virus report, or uncheck this box to disable it.
•
Detected Requests: Check this box to display the number of viruses detected by the Anti-Virus service in the graph. To view more information about detected requests, click the red bar in the graph. A pop-up window displays the following information for each detected request: the date and the time, the IP address and the MAC address of the source and of the destination, the protocol used for the connection, the action taken, and the number of times a virus was found.
•
Processed Requests: Check this box to display the number of files checked by the Anti-Virus service in the graph.
STEP 2
Click Save to save your settings.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of files checked and total number of viruses detected since the Anti-Virus service was activated.
|
Total Last 7 Days
|
Total number of files checked and total number of viruses detected in last seven days.
|
Total Today
|
Total number of files checked and total number of viruses detected in one day.
|
Graph
|
Total number of files checked and total number of viruses detected per day in last seven days.
|
Email Security Report
This report displays the number of emails checked and the number of spam or suspected spam emails detected by the Spam Filter service.
STEP 1
In the Email Security tab, specify the following information:
•
Enable: Check this box to enable the email security report, or uncheck this box to disable it.
•
Blocked Requests: Check this box to display the number of spam or suspected spam emails detected by the Spam Filter service in the graph.
•
Processed Requests: Check this box to display the number of emails checked by the Spam Filter service in the graph.
STEP 2
Click Save to save your settings.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of emails checked and total number of spam or suspected spam emails detected since the Spam Filter service was activated.
|
Total Last 7 Days
|
Total number of emails checked and total number of spam or suspected spam emails detected in last seven days.
|
Total Today
|
Total number of emails checked and total number of spam or suspected spam emails detected in one day.
|
Graph
|
Total number of emails checked and total number of spam or suspected spam emails detected per day in last seven days.
|
Network Reputation Report
This report displays the number of packets checked and the number of packets blocked by the Network Reputation service.
STEP 1
In the Network Reputation tab, specify the following information:
•
Enable: Check this box to enable the network reputation report, or uncheck this box to disable it.
•
Blocked Requests: Check this box to display the number of packets blocked by the Network Reputation service in the graph.
•
Processed Requests: Check this box to display the number of packets checked by the Network Reputation service in the graph.
STEP 2
Click Save to save your settings.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of packets checked and total number of packets blocked since the Network Reputation service was activated.
|
Total Last 7 Days
|
Total number of packets checked and total number of packets blocked in last seven days.
|
Total Today
|
Total number of packets checked and total number of packets blocked in one day.
|
Graph
|
Total number of packets checked and total number of packets blocked per day in last seven days.
|
IPS Report
This report displays the number of packets detected and the number of packets dropped by the Intrusion Prevention (IPS) service.
STEP 1
In the IPS tab, specify the following information:
•
Enable: Check this box to enable the IPS report, or uncheck this box to disable it.
•
Blocked Requests: Check this box to display the number of packets dropped by the IPS service in the graph. To view more information about blocked requests, click the red bar in the graph. A pop-up window displays the following information for each blocked request: the date and time, the IP address and the MAC address of the source and of the destination, the action taken, and the number of times that this event was detected.
•
Processed Requests: Check this box to display the number of packets detected by the IPS service in the graph.
STEP 2
Click Save to save your settings.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of packets detected and total number of packets dropped since the IPS service was activated.
|
Total Last 7 Days
|
Total number of packets detected and total number of packets dropped in last seven days.
|
Total Today
|
Total number of packets detected and total number of packets dropped in one day.
|
Graph
|
Total number of packets detected and total number of packets dropped per day in last seven days.
|
Application Control Report
This report displays the number of packets detected and the number of packets blocked by the Application Control service.
STEP 1
In the Application Control tab, specify the following information:
•
Enable: Check this box to enable the application control report, or uncheck this box to disable it.
•
Blocked Requests: Check this box to display the number of packets dropped by the Application Control service in the graph. To view more information about blocked requests, click the red bar in the graph. A pop-up window displays the following information for each blocked request: the date and time, the IP address and the MAC address of the host that initiated the request, the blocked application, and the number of times that the application was blocked.
•
Processed Requests: Check this box to display the number of packets detected by the Application Control service in the graph.
STEP 2
Click Save to save your settings.
Field
|
Description
|
System Date
|
Current system time.
|
Total Since Activated
|
Total number of packets detected and total number of packets blocked since the Application Control service was activated.
|
Total Last 7 Days
|
Total number of packets detected and total number of packets blocked in last seven days.
|
Total Today
|
Total number of packets detected and total number of packets blocked in one day.
|
Graph
|
Total number of packets detected and total number of packets blocked per day in last seven days.
|
System Status
Use the System Status pages to view information for all running processes and the system's CPU and memory utilization. Refer to the following topics:
•
Processes
•
Resource Utilization
Processes
Use the System Status > Processes page to view information for all running processes. This page is automatically updated every 10 seconds. Click Refresh to manually refresh the data.
System Status > Processes
Field
|
Description
|
Name
|
Name of the process that is running on your security appliance.
|
Description
|
Brief description for the running process.
|
Protocol
|
Protocol that is used by the socket.
|
Port
|
Port number of the local end of the socket.
|
Local Address
|
IP address of the local end of the socket.
|
Foreign Address
|
IP address of the remote end of the socket.
|
Resource Utilization
Use the System Status > Resource Utilization page to view information for the system's CPU and memory utilization.
System Status > Resource Utilization
Field
|
Description
|
CPU Utilization
|
CPU Usage by User
|
CPU resource currently used by user space processes, in percentage.
|
CPU Usage by Kernel
|
CPU resource currently used by kernel space processes, in percentage.
|
CPU Idle
|
CPU idle resource at current time, in percentage.
|
CPU Waiting for I/O
|
CPU resource currently waiting for I/O, in percentage.
|
Memory Utilization
|
Total Memory
|
Total amount of memory space available on the security appliance.
|
Memory Used
|
Total amount of memory space currently used by the processes.
|
Free Memory
|
Total amount of memory space currently not used by the processes.
|
Cached Memory
|
Total amount of memory space currently used as cache.
|
Buffer Memory
|
Total amount of memory space currently used as buffers.
|