- play_arrow Administration Portal
- play_arrow Introduction
- Unified Administration and Customer Portal Overview
- Administration Portal Overview
- Logging in to Administration Portal
- Switching the Tenant Scope
- Changing the Administration Portal Password
- Changing the Password on First Login
- Resetting the Password
- Setting Password Duration
- Extending the User Login Session
- Setting Up the Cloud CPE Centralized Deployment Model with Administration Portal
- Setting Up the Cloud CPE Distributed Deployment Model with Administration Portal
- play_arrow Managing Objects
- play_arrow Using the Dashboard
- play_arrow Monitoring Alerts, Alarms, and Device Events
- play_arrow Monitoring Tenants SLA Performance
- Multidepartment CPE Device Support
- About the SLA Performance of All Tenants Page
- About the SLA Performance of a Single Tenant Page
- Monitoring Application-Level SLA Performance for real time-optimized SD-WAN
- Viewing the SLA Performance of a Site
- Viewing the SLA Performance of an Application or Application Group
- Understanding SLA Performance Score for Applications, Links, Sites, and Tenants
- play_arrow Monitoring Jobs
- play_arrow Managing POPs
- About the POPs Page
- Creating a Single POP
- Importing Data for Multiple POPs
- Viewing the History of POP Data Imports
- Viewing the History of POP Data Deletions
- Managing a Single POP
- About the VIMs Page
- Creating a Cloud VIM
- About the EMS Page
- Creating an EMS
- Changing the Junos Space Virtual Appliance Password
- About the Routers Page
- Creating Devices
- Configuring Devices
- View the History of Device Data Deletions
- play_arrow Managing Devices
- About the Tenant Devices Page
- About the Cloud Hub Devices Page
- Managing a Tenant Device
- Managing a Cloud Hub Device
- Device Redundancy Support Overview
- Viewing the History of Tenant Device Activation Logs
- Viewing the History of Cloud Hub Device Activation Logs
- Secure OAM Network Overview
- Adding a Cloud Hub Device
- Upgrading a Cloud Hub Device
- Rebooting a CPE Device
- play_arrow Managing Device Templates
- play_arrow Managing Software Images
- play_arrow Configuring Network Services in a Centralized Deployment
- Network Services Overview
- About the Network Services Page
- About the Service Overview Page
- About the Service Instances Page
- Configuring VNF Properties
- Allocating a Service to Tenants
- Removing a Service from Tenants
- Viewing a Service Configuration
- vSRX VNF Configuration Settings
- LxCIPtable VNF Configuration Settings
- Cisco CSR-1000v VNF Configuration Settings
- Riverbed Steelhead VNF Configuration Settings
- Managing a Single Service
- play_arrow Configuring Application SLA Profiles
- Application Quality of Experience (AppQoE) Overview
- About the Application Traffic Type Profiles Page
- Creating Traffic Type Profiles
- Editing and Deleting Traffic Type Profiles
- SLA Profiles and SD-WAN Policies Overview
- Cost-Based Link Switching
- Local Breakout Overview
- About the Application SLA Profiles Page
- Creating SLA Profiles
- Editing and Deleting SLA Profiles
- play_arrow Configuring Application Signatures
- play_arrow Managing Tenants
- play_arrow Managing Operating Companies
- play_arrow Configuring SP Users
- play_arrow Managing Audit Logs
- play_arrow Managing Roles
- play_arrow Configuring Authentication
- play_arrow Configuring Licenses
- play_arrow Customizing the Unified Portal
- play_arrow Managing Signature Database
-
- play_arrow Designer Tools
- play_arrow Configuration Designer
- Configuration Designer Overview
- Accessing the Configuration Designer
- Using the Configuration Designer
- Changing Your Password
- About the Requests Page for the Configuration Designer
- Creating Requests for Configuration Templates
- Designing Templates with a YANG Configuration
- Designing Templates with a Configuration
- Publishing Configuration Templates
- About the Designs Page for the Configuration Designer
- Cloning Configuration Templates
- Deleting Configuration Template Designs
- play_arrow Resource Designer
- Resource Designer Overview
- Using the Resource Designer
- Accessing the Resource Designer
- About the Requests Page for the Resource Designer
- VNF Overview
- Creating Requests for VNF Packages
- Designing VNF Packages
- Adding VNF Managers
- Publishing VNF Packages
- About the Designs Page for the Resource Designer
- Cloning VNF Packages
- Importing VNF Packages
- Exporting VNF Packages
- Deleting VNF Packages
- play_arrow Network Service Designer introduction
- play_arrow Creating Requests for Network Services
- play_arrow Creating Network Services
- About the Build Page for the Network Service Designer
- Viewing Information About VNFs
- Designing Network Services
- Connecting VNFs in a Service Chain
- Defining Ingress and Egress Points for a Service Chain
- Monitoring Performance Goals
- Configuring Network Services
- vSRX Configuration Settings
- LxCIPtable VNF Configuration Settings
- Cisco CSR-1000v VNF Configuration Settings
- Riverbed Steelhead VNF Configuration Settings
- Fortinet VNF Configuration Settings
- Ubuntu VNF Configuration Settings
- play_arrow Managing Network Services
-
- play_arrow Downloads
About the Application Visibility Page
To access this page, select Monitor > Applications > Visibility.
There are two ways in which you can view your application visibility data—Chart View or Grid View. By default, the data is displayed in Chart View.
Tasks You Can Perform
You can perform the following tasks from this page:
View application visibility data in Chart View. See Chart View.
View application visibility data in Grid View. See Grid View.
Select a device to which the application visibility settings are applicable. See Selecting Devices.
Chart View
Click the Chart View link for a brief summary of the top 50 applications consuming the maximum bandwidth in your network. The data can be presented graphically as a bubble graph, heat map, or a zoomable bubble graph. The data is refreshed automatically based on the selected time range. You can also use the Custom button to set a custom time range.
You can hover over your applications to view critical information such as total number of sessions, total number of blocks, category, bandwidth consumed, risk levels, and characteristics. You can also view the top five users accessing your application.
Table 1 provides guidelines on using the fields on the Chart View of the Application Visibility page.
Table 1: Fields on the Chart View
Field | Description |
---|---|
All Devices | Displays application visibility data for all the sites managed by CSO. Click Edit to select individual devices for which you want to view the data. |
Show By | Select from the following options to view a user’s data:
|
Time Span | Select the required time range to view a user’s data. Use the custom option to choose the time range if you want to view data for more than one day. The time range is from 00:00 through 23:59. |
Select graph | Select from the following graphical representations to view an application’s data:
By default, data is shown in the Bubble Graph format. |
Group By | Select from the following options to view the application’s data:
|
Number of Sessions | Displays the total number of application sessions. |
Number of Blocks | Displays the total number of times the application was blocked. |
Bandwidth | Displays the bandwidth usage of the application. |
Risk Level | Displays the risk associated with the application. For example, critical, high, unsafe, and so on. |
Category | Displays the category of the application. For example, web, infrastructure, and so on. |
Characteristics | Displays the characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling, and so on. |
Grid View
Click the Grid View link to obtain comprehensive details about applications. You can view top users by volume, top applications by volume, top category by volume, top characteristics by volume, and sessions by risk. You can also view the data in a tabular format that includes sortable columns. You can sort the applications in ascending or descending order based on application name, risk level, and so on. Table 2 describes the widgets in this view. Use these widgets to get an overall, high-level view of your applications, users, and the content traversing your network.
Table 2 provides guidelines on using the fields on the Grid View of the Application Visibility page.
Table 2: Widgets on the Grid View
Field | Description |
---|---|
Top Users By Volume | Top users of the application; sorted by bandwidth consumption. |
Top Apps By Volume | Top applications using the network traffic, such as Amazon, Facebook, and so on, sorted by bandwidth consumption. |
Top Category By Volume | The top category of the application, such as Web, infrastructure, and so on; sorted by bandwidth consumption. |
Top Characteristics By Volume | Top behavioral characteristics of the application, such as whether it is highly prone to misuse, the top bandwidth consumer, and so on. |
Sessions By Risk | Number of events or sessions received; grouped by risk. |
Table 3 describes the fields in the table below the widgets. Users are displayed by usernames or IP addresses. When you click a link, the User Visibility page appears in a grid view, with the correct filter applied. Sessions are also displayed as links and when you click a link, the All Events page appears with all security events.
Table 3: Detailed View of Applications
Field | Description |
---|---|
Application Name | Name of the application, such as Amazon, Facebook, and so on. |
Risk Level | Risk associated with the application: critical, high, unsafe, moderate, low, and unknown. |
Users | Total number of users accessing the application. |
Volume | Bandwidth used by the application. |
Total Sessions | Total number of application sessions. |
No of Rejects | Total number of sessions blocked. |
Category | Category of the application, such as Web, infrastructure, and so on. |
Sub Category | Subcategory of the application. For example, social networking, news, and advertisements. |
Characteristics | Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling. |