- play_arrow Juniper Web Device Manager
- play_arrow Getting Started
-
- play_arrow Dashboard
- play_arrow J-Web Dashboard
-
- play_arrow Device Administration
- play_arrow Basic Settings
- play_arrow Cluster Management
- play_arrow User Management
- play_arrow Multi Tenancy—Resource Profiles
- play_arrow Multi Tenancy—Interconnect Ports
- play_arrow Multi Tenancy—Logical Systems
- play_arrow Multi Tenancy—Tenants
- play_arrow Certificate Management—Device Certificates
- play_arrow Certificate Management—Trusted Certificate Authority
- About the Trusted Certificate Authority Page
- Generate Default Trusted Certificate Authorities
- Enroll a CA Certificate
- Import a CA Certificate
- Add a Certificate Authority Profile
- Edit a Certificate Authority Profile
- Delete Certificate Authority Profile
- Search Text in the Trusted Certificate Authority Table
- play_arrow Certificate Management—Certificate Authority Group
- play_arrow License Management
- play_arrow ATP Management
- play_arrow Operations
- play_arrow Software Management
- play_arrow Configuration Management
- play_arrow Alarm Management
- play_arrow RPM
- play_arrow Tools
- play_arrow Reset Configuration
-
- play_arrow Network
- play_arrow Connectivity—Ports
- play_arrow Connectivity—VLAN
- play_arrow Connectivity—Link Aggregation
- play_arrow Connectivity—PPPoE
- play_arrow Connectivity—Wireless LAN
- play_arrow DHCP Client
- play_arrow DHCP Server
- play_arrow Firewall Filters—IPv4
- play_arrow Firewall Filters—IPv6
- play_arrow Firewall Filters—Assign to Interfaces
- play_arrow NAT Policies
- play_arrow NAT Pools
- play_arrow Destination NAT
- play_arrow Static NAT
- play_arrow NAT Proxy ARP/ND
- play_arrow Static Routing
- play_arrow RIP Routing
- play_arrow OSPF Routing
- play_arrow BGP Routing
- play_arrow Routing Instances
- play_arrow Routing—Policies
- play_arrow Routing—Forwarding Mode
- play_arrow CoS—Value Aliases
- play_arrow CoS—Forwarding Classes
- play_arrow CoS Classifiers
- play_arrow CoS—Rewrite Rules
- play_arrow CoS—Schedulers
- play_arrow CoS—Scheduler Maps
- play_arrow CoS—Drop Profile
- play_arrow CoS—Virtual Channel Groups
- play_arrow CoS—Assign To Interface
- play_arrow Application QoS
-
- play_arrow Security Policies and Objects
- play_arrow Security Policies
- play_arrow Zones/Screens
- play_arrow Zone Addresses
- play_arrow Global Addresses
- play_arrow Services
- play_arrow Dynamic Applications
- play_arrow Application Tracking
- play_arrow Schedules
- play_arrow Proxy Profiles
-
- play_arrow Security Services
- play_arrow UTM Default Configuration
- play_arrow UTM Antivirus Profiles
- play_arrow UTM Web Filtering Profiles
- play_arrow UTM Web Filtering Category Update
- play_arrow UTM Antispam Profiles
- play_arrow UTM Content Filtering Profiles
- play_arrow UTM Custom Objects
- play_arrow UTM Policies
- play_arrow IPS Signature Update
- play_arrow IPS Sensor
- play_arrow IPS Policy
- play_arrow ALG
- play_arrow Advanced Threat Prevention
- play_arrow SSL Initiation Profiles
- play_arrow SSL Proxy Profiles
- play_arrow Firewall Authentication—Access Profile
- play_arrow Firewall Authentication—Address Pools
- play_arrow Firewall Authentication Settings
- play_arrow Firewall Authentication—UAC Settings
- play_arrow Firewall Authentication—Active Directory
- play_arrow Firewall Authentication—Local Authentication
- play_arrow Firewall Authentication—Authentication Priority
- play_arrow Firewall Authentication—Identity Management
- play_arrow ICAP Redirect
-
- play_arrow VPN
- play_arrow IPsec VPN
- play_arrow Manual Key VPN
- play_arrow Dynamic VPN
-
Monitor Applications
You are here: Monitor > Maps and Charts > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications. Analyzing your network applications yields useful security management information, such as abnormal applications that can lead to data loss, bandwidth hogging, time-consuming applications, and personal applications that can elevate business risks.
Applications page is available on all the SRX Series devices except the SRX5000 line of devices.
To view the data on the Applications page, ensure that:
On-box traffic logging and reporting is enabled. If not, go to Device Administration > Basic Settings > Security Logging, enable Stream mode Logging and On-box Reporting.
Logging is enabled for a matching traffic firewall policy. If not, go to Security Policies & Objects > Security Policies and enable Logging options under Rule Options.
Application tracking is enabled for a security zone. If not, go to Security Policies & Objects > Zones/Screens and enable Application Tracking in the Add Zone page.
You can select either the Grid View tab or the Chart View tab to view your data:
Grid View—View the comprehensive details of applications in a tabular format that includes sortable columns. You can group the applications using Top users by volume, Top apps by volume, timespan, username, and so on. The table includes information such as the application name, volume, users and so on. Table 1 describes the fields on the Grid View page.
Chart View—View a brief summary of all the applications. It shows the top 50 applications consuming maximum bandwidth in your network. The data is presented graphically as a bubble graph, heat map, or zoomable bubble graph. Table 2 describes the widgets on the Chart View page.
Field | Description |
---|---|
Top Users By Volume | Top users of the application; sorted by bandwidth consumption. |
Top Apps By Volume | Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption. |
Top Category By Volume | Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption. |
Top Characteristics By Volume | Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application. |
Sessions By Risk | Number of events/sessions received; grouped by risk. |
Time Span | Allows you to select a time period. Click Custom to select a preferred date. |
View App Logs | Enables you to view the application logs. |
Search | Enables you to search a particular content from the data. |
Application Name | Name of the application, such as Amazon, Facebook, and so on. |
Risk Level | Risk associated with the application: critical, high, unsafe, moderate, low, and unknown. |
Users | Total number of users accessing the application. |
Volume | Bandwidth used by the application. |
Total Sessions | Total number of application sessions. |
Category | Category of the application, such as web, infrastructure, and so on. |
Sub-Category | Subcategory of the application. For example, social networking, news, and advertisements. Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on. |
Characteristics | Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling. Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth. |
Field | Description |
---|---|
Top 50 Applications | Displays the top 50 application consuming maximum bandwidth in your network. The data is presented graphically as a bubble graph, heat map, or zoomable bubble graph. |
Show By | Allows you to reorder the bubble graph by bandwidth or by number of sessions from the drop down. If Bandwidth is selected, the size of the bubble depends on the bandwidth used. Whereas, if Number of Session is selected, the size of the bubble depends upon the number of sessions. |
Time Span | Allows you to select a time. Click Custom to select a preferred date. |
Group By | Allows you to group the bubble graph by bandwidth or by number of sessions from the drop down based on risk or categories. |