Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel2
maxLevel2
typeflat

Purpose

Palo Alto Networks Firewalls Summary Firewall Monitoring Activeboard allows you to auto-discover all installed firewall entities deployed in your network and start collecting operational and threats intelligence from them in a unified view. You can also center the analysis of network threats and alerts on individual network elements, and filter all events related to themanalyze and monitor firewall traffic logs from different angles. In this Activeboard you will be able to:

  • Get data insights and filter them.

  • Track the traffic volume and actions.

  • Have access to Traffic Reputation heatmaps.

  • Compare the connections.

  • Get details about the most used Firewall rules.

  • Analyze denied firewall traffic and most rejected source IPs.

Pre-requisites

To use the Palo Alto Networks Firewalls Summary Firewall Monitoring Activeboard, you must have the following data sources available on your domain:

Open Palo Alto Networks Summary

Open Firewall Monitoring

Once you have installed the application, you can access the Activeboard in the following ways:

Go to Exchange in the navigation pane and look for the Activeboard you want to open. Click Open.

Image Modified

Go to Activeboards in the navigation paneand use the filter to open the Activeboard you downloaded.

Image Modified
Info

Refer to Manage and filter Activeboards article to know how to work with Activeboards.

Exploring the Activeboard

When opening the Palo Alto Network Firewalls Summary Activeboard, the following info displays:

Image Modified

Rw ui expands macro
Rw expand
titleClick here to see the details

Widget

Details

1

Image Modified

Active Firewalls

2

6

Image Removed

Source IP Input

7

Filters for data insights

Image Modified

Potential Threats Detected

3

Image Removed

Critical System Events

4

Image Removed

Admin Login Attempts

5

Image Removed

Destination IP Input

Last 100 Firewall Events

Image Added

Traffic Volume by Application (last day)

Image Added

Traffic Action Distribution

Image Added

Traffic Activity Over Time by Action

Image Added

Traffic Activity Over Time by Protocol

Image Modified

Source IP List

8

Image Modified

Bandwith

9

Image Modified

Destination IP List

10

Image Modified

Firewall Actions (Allow vs. Deny)

11

Image Modified

Top Source IPs (by bytes)

Image Added

Source IP by:

  • Connections

  • Total KB

Image Added

Destinations IP by:

  • Connections

  • Total KB

Image Added

Top Talkers by Connections

Image Added

Top Talkers by Data Transfer

Image Added

Most Used Firewall Rules - Occurrence

Image Added

Most Used Firewall Rules - Detail

Image Added

Most Used Firewall Rules

Image Added

Most rejected Source IPs (>1000)

Image Added

Most Rejected Source IPs