Alto MONITOR Manuel d'utilisateur Page 12

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 18
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 11
156 Panorama Administrator’s Guide
Use Case: Monitor Applications Using Panorama Monitor Network Activity
The Monitor > App-Scope> Traffic Map tab displays a geographical map of the traffic flow and provides a view of
incoming versus outgoing traffic. You can also use the
Monitor > App-Scope > Change Monitor tab to view changes
in traffic patterns. For example, compare the top applications used over this hour to the last week or month to
determine if there is a pattern or trend.
With all the information you have now uncovered, you can evaluate what changes to make to your policy
configurations. Here are some suggestions to consider:
Be restrictive and to create a pre-rule on Panorama to block all BitTorrent traffic. Then use Panorama device
groups to create and push this policy rule to one or more firewalls.
Enforce bandwidth use limits and create a QoS profile and policy that de-prioritizes non-business traffic.
Then use Panorama templates to push this policy to one or more firewalls. Refer to the article Panorama
Templates for defining QoS policy using templates.
Reduce risk to your network assets and create an application filter that blocks all file sharing applications that
are peer-to-peer technology with a risk factor of 4 or 5. Make sure to verify that the bittorrent application is
included in that application filter, and will therefore be blocked.
Schedule a custom report group that pulls together the activity for the specific user and that of top
applications used on your network to observe that pattern for another week or two before taking action.
Besides checking for a specific application, you can also check for any unknown applications in the list of top
applications. These are applications that did not match a defined App-ID signature and display as unknown-udp
and unknown-tcp. To delve into these unknown applications, click on the name to drill down to the details for the
unclassified traffic.
Copyright © 2007-2014 Palo Alto Networks
Vue de la page 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 18

Commentaires sur ces manuels

Pas de commentaire