Vous êtes sur la page 1sur 6

Application Traffic Report

Overview
The FortiGate unit can recognize the network traffic generated by a large number of applications. You can create application control lists that specify the action to take with the traffic of the applications you need to manage and the network on which they are active,and then add application control lists to protection profiles applied to the network traffic you need to monitor The main points are: Determine average usage patterns What applications cause the bulk of the traffic What time periods are the busiest Which users cause the bulk of the traffic What applications do those users use to cause the traffic Is the application traffic important Determine ways to minimize or eliminate unwanted application traffic

Application Chats In Last 24 Hours


1.Distribution of Applications By Type In Last 24 Hours

The preceding pie charts show the distribution of applications categories types as a percentage of the whole applications for entire analysis period. 2. Top 10 Applications By Bandwidth In Last 24 Hours

The preceding bar charts show the top 10 applications types based on the accumulated traffic volume in entire analysis period 3.Top 10 Applications Used In Last 24 Hours

The preceding bar charts show the top 10 applications used in analysis period. 4.Top 10 Allowed P2p Local Peers Over Last 24 Hours

The preceding bar charts show the top 10 allowed P2P local peers 5.Top 10 Blocked P2p Local Peers Over Last 24 Hours

The preceding bar charts show the top 10 blocked P2P local peers

6.Top 10 Allowed Bittorrent Local Peers Over Last 24 Hours

The preceding bar charts show the top 10 allowed different P2P clients local peers which can be Bittorrent,eDonkey,Gnutella and Skype

7.Top 10 Blocked Bittorrent Local Peers Over Last 24 Hours

The preceding bar charts show the top 10 blocked different P2P clients local peers which can be Bittorrent,eDonkey,Gnutella and Skype 8.Distribution Of Attack Protocols Over The Last 24 Hours

The preceding pie charts show the attack distribution based on different TCP and UDP ports 9.Top 10 Attack Destinations Over The Last 24 Hours

The preceding bar charts show the top 10 attack based on destination hosts ip address

10.Top 10 Attack Sources Over The Last 24 Hours

The preceding bar charts show the top 10 attack based on source hosts ip address 11.Top 10 Attacks Over The Last 24 Hours

The preceding bar charts show the top 10 attack based on attack types.

Vous aimerez peut-être aussi