SUMMARY You can use the search feature to filter your topology view, and zone in on network
paths, hosts, subnets, and other network elements. You can refine your search down to the port or
protocol level, for example you can search for potential attack paths on allowed protocols or ports.
- Click the Risks tab, and then click
Topology on the navigation menu.
- Click Actions.
- Enter your search criteria in the Search Criteria pane.
The following table describes examples of search options that you can
use:
Search option |
Description |
Hosts |
If you search for a host, all devices that communicate with that host are displayed. If the
host does not match an interface on a device, but is included in the subnet, that subnet and all
connected devices are displayed. |
Networks |
Search for a single CIDR, for example, 10.3.51.200/24. If you're
searching for multiple CIDRs, ensure that the CIDRs are valid and are separated by a comma, for
example, 10.51.0.0/24,10.51.01/24.
|
Paths |
A path search displays the traffic direction, fully or partially allowed protocols, and
device rules. If you select any path search criteria other than the mandatory source and destination
IP addresses, a path summary is displayed. Refine your path search by searching for applications,
vulnerabilities, and users or user groups.
|
- To search events, right-click the device or subnet that you want to
investigate.
- To search flows, right-click any subnets that you want to investigate.