6.4. Node Dashboards

For each node that sends logs to InCenter, a number of dashboards are available in the WebUI which provide both details and a summary of node activity. These dashboards provide information in both a graphical and numerical way.

nodes should first be correctly configured to send log messages to InCenter. The node configuration steps are described in Section 6.3, Setting Up Monitoring. In addition, a node should also have been added to InCenter and doing this is described in Section 6.3.1, Adding NetWall Nodes with the WebUI. It is not necessary for a node to be under full centralized control by InCenter for monitoring to function.

The No-Logs Message

When trying to display dashboards for the first time, the message shown below might appear to indicate that no log messages are available for dashboard display.

The No-Logs Message

Figure 6.8. The No-Logs Message

The above message appears for one of the following reasons:

Dashboard Types

A dashboard can display information for a single node or a summary for multiple nodes. All dashboards are accessed by selecting the Analyze option in the navigation pane and can then be selected by type, as shown below.

Dashboard Type Menu

Figure 6.9. Dashboard Type Menu

Each dashboard provides numeric and graphical summaries of the historical activity for the nodes that have been added to InCenter. Every dashboard has common controls for filtering the information displayed. This filtering can be by:

Adding a Filter

It is possible to narrow the log messages being analyzed by adding a filter to a dashboard. This is done by selecting the Add a Filter option. This opens a dialog which allows a field in log messages to be specified along with a string value to match against plus a logical operator that links the two. Below is an example of a filter that specifies only log messages where the source IP address matches 203.0.113.5 are to be included.

Add Dashboard Filter

Figure 6.14. Add Dashboard Filter

Alternatively, it is possible to build complex queries using the query DSL search language by clicking the Edit Query DSL option.

Note that this filter type is not removed if the Remove All Filters button is pressed. Instead, the delete "cross" button on the filter must be pressed to remove it.

6.4.1. Overview Dashboard

When the InCenter interface is first opened, the default Overview dashboard is presented. This is an overall summary of recent activity for all monitored firewalls. This summary can be displayed at any later time by selecting the Overview option.

Overview Option Button

Figure 6.15. Overview Option Button

Below is an example of the information presented by the first part of the summary.

Overview Dashboard Example

Figure 6.16. Overview Dashboard Example

The second part of the summary provides further graphical represenations of the overall node activity plus a tabular summary of the 10 most active active nodes in terms of data volumes.

Continued Overview with Top Nodes by Data Volume

Figure 6.17. Continued Overview with Top Nodes by Data Volume

6.4.2. Network Allowed

The Network Allowed dashboards present an overview of traffic sources that have been allowed by the IP policies of monitored firewalls. An example of the initial dashboard display is shown below.

Network Allowed Dashboard - Overview Example

Figure 6.18. Network Allowed Dashboard - Overview Example

The various tabs in this dashboard present the following information:

  • Applications

    This summarizes the allowed connections that have been processed by application control.

Network Allowed - Applications Dashboard Example

Figure 6.19. Network Allowed - Applications Dashboard Example

  • Network & Policies

    This presents the source IP addresses that were allowed.

Network Allowed - Network Dashboard Example

Figure 6.20. Network Allowed - Network Dashboard Example

  • Web

    This summarizes the types of URLs that were allowed by web content filtering.

Network Allowed - Web Dashboard Example

Figure 6.21. Network Allowed - Web Dashboard Example

  • Log

    This is a list of the log messages received.

Network Allowed - Log Dashboard Example

Figure 6.22. Network Allowed - Log Dashboard Example

6.4.3. Network Denied

The Network Denied dashboards present the sources of traffic that has not been allowed by IP policies. It can be viewed as the opposite of the Networks Allowed dashboards. The tabs also present the denied networks by type, corresponding to the same tabs in the Network Allowed dashboard.

Network Denied Dashboard Example

Figure 6.23. Network Denied Dashboard Example

6.4.4. Threats Unhandled

The Threats Unhandled dashboards are similar to the Threats Denied dashboards but provide an overview of threats that were detected in the "high risk" or "very high risk" categories but which were not blocked.

It may be often desirable to introduce security policies which first audit threats instead of blocking them straight away. This dashboard can give the administrator a way to gauge the effect of changing policies from auditing to blocking.

Threats Unhandled Dashboard Example

Figure 6.24. Threats Unhandled Dashboard Example

6.4.5. Threats Denied

The Threats Denied dashboards present an overview of threats that have been blocked by monitored firewalls. An example is shown below where a time range of 24 hours has been selected.

Threats Denied Dashboard Example

Figure 6.25. Threats Denied Dashboard Example

The following tabs allow a further breakdown of the denied data:

  • Anti-Malware

    This summarizes connections dropped by anti-virus scanning.

  • Botnet

    This summarizes connections dropped by botnet protection.

  • DoS

    This summarizes connections dropped by DoS (denial of service protection).

  • IDP

    This summarizes connections dropped by the intrusion detection prevention (IDP) subsystem.

  • Scanner

    This summarizes connections dropped by scanner protection.

6.4.6. VPN

The VPN dashboards present a summary of activity related to IPsec, L2TP and PPTP tunnels. Selecting one of the protocol specific tabs provides more detailed information about each protocol.

VPN Dashboard Example

Figure 6.26. VPN Dashboard Example

Note that SSL VPN traffic monitoring is covered by Section 6.4.8, OneConnect.

6.4.7. Communication

The Communication dashboard presents a summary of the traffic that is passing through nodes between external hosts and devices. An example of the first part of the communication summary page is shown below.

Communication Dashboard Overview - Summary

Figure 6.27. Communication Dashboard Overview - Summary

The second part of the communication summary page provides a tabular summary of the IP rule set entries that are triggering within nodes in order to allow traffic. Columns within this table provide detailed information on how many connections are being allowed for each listed rule set entry and how much traffic is flowing.

Communication Dashboard Overview - Policies

Figure 6.28. Communication Dashboard Overview - Policies

6.4.8. OneConnect

The OneConnect dashboard presents the activity of users who are connecting to a NetWall node over SSL VPN using the OneConnect client. Below is an example of the first part of the summary for OneConnect.

OneConnect Overall Summary

Figure 6.29. OneConnect Overall Summary

The second part of the summary page presents the top users in terms of connections, failed connections, traffic and session time.

OneConnect Users Summary

Figure 6.30. OneConnect Users Summary

6.4.9. Log Analyzer

The Log Analyzer dashboard presents a summary of the log event messages that InCenter is receiving from configured firewalls. The graph at the top provides a graphical summary of the different categories of logs received.

Log Analyzer Dashboard Example

Figure 6.31. Log Analyzer Dashboard Example