You are here: Monitor > Security Services > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications.
Note To view the data on the Applications page, ensure that:
Logging is enabled. If not, go to Configure > Device Settings > Basic Settings > Security Logging and enable Logging.
Logging is enabled for a matching traffic firewall policy. If not, go to Configure > Device Settings > Security Services > Security Policy > Rules and enable Log Options under Rule Options.
Application tracking is enabled for a security zone. If not, go to Configure > Security Services > Security Policy > Objects > Zones/Screens and enable Application Tracking.
Table 93 describes the fields on the Applications page.
Table 93: Fields on the Applications Page
Field | Description |
---|---|
Top Users By Volume | Top users of the application; sorted by bandwidth consumption. |
Top Apps By Volume | Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption. |
Top Category By Volume | Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption. |
Top Characteristics By Volume | Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application. |
Sessions By Risk | Number of events/sessions received; grouped by risk. |
View App Logs | Enables you to view the application logs. |
Search | Enables you to search a particular content from the data. |
Application Name | Name of the application, such as Amazon, Facebook, and so on. |
Risk Level | Risk associated with the application: critical, high, unsafe, moderate, low, and unknown. |
Users | Total number of users accessing the application. |
Volume | Bandwidth used by the application. |
Total Sessions | Total number of application sessions. |
Category | Category of the application, such as web, infrastructure, and so on. |
Sub-Category | Subcategory of the application. For example, social networking, news, and advertisements. Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on. |
Characteristics | Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling. Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth. |
© 2020 Juniper Networks, Inc. All rights reserved