Firewall Drop Dashboard
Firewall Drop Dashboard overview
The Firewall Drop Dashboard shows the AA firewall packet-drop activity on selected AA partitions.
Use cases
Network security monitoring—Use the report to monitor network threats and identify potential attacks.
Policy verification—Use the report to ensure that policies are not dropping legitimate traffic.
Dashboard characteristics
The following table lists the principal dashboard characteristics.
Table 5-1: Firewall Drop Dashboard characteristics
Characteristic |
Value |
Statistics type |
AA Accounting add/drop |
NSP Flow Collector required |
No |
Domains |
Residential / Wi-Fi (ESM)
Mobile
Wi-Fi (DSM)
Business |
Report inputs |
Prompt |
Notes |
End date |
Calendar date or relative date (for example, two days ago) and time |
Report range |
Length of time to be reported, in minutes (minutes, min), hours (hours, h), days (days, d), weeks (w), or months (months, m) |
Granularity |
Aggregation types:
-
None (raw data)
-
Hourly
-
Daily
-
Monthly |
Node type |
Search using partial names or wildcard (%).
Select individual items or click Select All. |
Site |
Group/Partition |
Session Filter Direction |
Upload and Download, Upload, or Download |
Policer Type |
Subscriber Flow Count, Subscriber Flow Rate, System Flow Count, System Flow Rate |
Anomaly Type |
Select individual items or click Select All. |
Anomaly Direction |
Upload and Download, Upload, or Download |
TCP Validation Direction |
Rank |
Number of statistics to report |
Drill-down support |
Yes—Display tables of the session filter, policer, and anomaly drop counts per direction |
Example
The following figures show the dashlets that the dashboard contains.