Cisco Cisco Firepower Management Center 4000

Page of 1844
 
4-8
FireSIGHT System User Guide
 
Chapter 4      Using the Context Explorer 
  Understanding the Context Explorer
Note
If you filter on intrusion event information, the Traffic by Source User graph is hidden. 
This graph draws data primarily from the Connection Events table. Note that it displays only users 
reported by the User Agent.
Viewing the Connections by Access Control Action Graph
License: 
FireSIGHT
The Connections by Access Control Action graph, in pie form, displays a proportional view of access 
control actions (such as 
Block
 or 
Allow
) that your FireSIGHT System deployment has taken on 
monitored traffic.
Hover your pointer over any part of the graph to view more detailed information. Click any part of the 
graph to filter or drill down on that information.
Note
If you filter on intrusion event information, the Traffic by Source User graph is hidden. 
This graph draws data primarily from the Connection Events table.
Viewing the Traffic by Destination IP Graph
License: 
FireSIGHT
The Traffic by Destination IP graph, in bar form, displays counts of network traffic (in kilobytes per 
second) and unique connections for the top 15 most active destination IP addresses on your monitored 
network. For each destination IP address listed, blue bars represent traffic data and red bars represent 
connection data.