Perimeter Monitoring

In the Reports Portal, select Repository > Standard Content > Foundation > Perimeter Monitoring.

The perimeters of an enterprise’s network handle a great deal of traffic, causing system administrators to face an ever-increasing need to allow fast, efficient flow of traffic while also keeping the network secure. If you pro-actively monitor the firewalls in your enterprise, you can identify problems at an early stage and prevent network attacks. Malicious users often exploit loopholes in your firewall rules, particularly any old or unused rules. Network traffic also can be vulnerable to unencrypted data.

To monitor your network’s perimeter, use the following dashboards and reports:

Dashboards Reports

Firewall Blocked Events

Firewall Traffic Overview

Firewall Configuration Changes

Firewall Blocked Traffic by Destination Address

To monitor your network’s perimeter, use the following dashboards and reports:

Firewall Blocked Events
Provides charts and a table for you to monitor the events that your firewalls have blocked, such as the bytes in and out for all blocked events. You can view the top events blocked per device, application protocol, source address, or destination address.
Firewall Blocked Traffic by Destination Address

Lists the top 10 firewall traffic events that have been blocked from reaching the specified hosts.

You must specify one IP address.

Firewall Configuration Changes
Lists the top 10 changes to the firewall configuration by host.
Firewall Traffic Overview
Provides charts and a table for you to monitor traffic through your firewalls, such as the bytes in and out by accepted and denied traffic. You can view the top reporting devices and destination addresses, as well as the outcomes of port usage over time. The table lists the Port, transport protocol, application protocol, and number of events reported by firewalls.