Monitor Policy Activities
You are here: Monitor > Security Services > Policy > Activities.
Use this page to display, sort, and review policy activity for every activated policy on the device.
Table 1 describes the fields on the Activities page.
Table 1: Fields on the Activities Page
Field | Description |
---|---|
Policy Context (Total #) | Displays a list of all from and to zone combinations for the configured policies. The total number of active policies for each context is specified in the Total # field. By default, the policies from the first Zone Context are displayed. To display policies for a different context, select a zone context and click Filter. Both inactive and active policies appear for each context. However, the Total # field for a context specifies the number of active policies only. |
Search | Enables you to search for a particular data in the grid. |
Clear Statistics | Clears the statistics in the associated pane. |
Default Policy action | Specifies the action to take for traffic that does not match any of the policies in the context:
|
From Zone | Displays the source zone to be used as match criteria for the policy. |
To Zone | Displays the destination zone to be used as match criteria for the policy. |
Name | Displays the name of the policy. |
Source Address | Displays the source addresses to be used as match criteria for the policy. Address sets are resolved to their individual names. (In this case, only the names are given, not the IP addresses). |
Destination Address | Displays the destination addresses (or address sets) to be used as match criteria for the policy. Addresses are entered as specified in the destination zone’s address book. |
Source Identity | Displays the name of the source identities set for the policy. To display the value of the source identities, hover the mouse on this field. Unknown source identities are also displayed. |
Application | Displays the name of a predefined or custom application signature to be used as match criteria for the policy. |
Dynamic App | Displays the dynamic application signatures to be used as match criteria if an application firewall rule set is configured for the policy. For a network firewall, a dynamic application is not defined. The rule set appears in two lines. The first line displays the configured dynamic application signatures in the rule set. The second line displays the default dynamic application signature. If more than two dynamic application signatures are specified for the rule set, hover over the output field to display the full list in a tooltip. |
Action | Displays the action portion of the rule set if an application firewall rule set is configured for the policy.
The action portion of the rule set appears in two lines. The first line identifies the action to be taken when the traffic matches a dynamic application signature. The second line displays the default action when traffic does not match a dynamic application signature. |
NW Services | Displays the network services permitted or denied by the policy if an application firewall rule set is configured. Network services include:
|
Log Action | Displays the action taken. |
View Logs | Enables you to see all the logs present. |
Refresh | Click the refresh icon at the top right corner to display the fresh content. |
Policy Hit Counters Graph | Provides a representation of the value over time for a specified counter. The graph is blank if Policy Counters indicates no data. As a selected counter accumulates data, the graph is updated at each refresh interval. To toggle a graph on and off, click the counter name below the graph. |
Policy Counters | Lists statistical counters for the selected policy if Count is enabled. The following counters are available for each policy:
To graph or to remove a counter from the Policy Hit Counters Graph, toggle the counter name. The names of enabled counters appear below the graph. |