Cisco Cisco Content Security Management Appliance M1070 Guía Del Usuario
5-27
AsyncOS 8.3.6 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
Table 5-11
L4 Traffic Monitor Report Page Components
Section
Description
Time Range (drop-down list)
A menu that allows you to choose a time range on which to report.
For more information, see
For more information, see
.
Top Client IPs
This section displays, in graph format, the IP addresses of
computers in your organization that most frequently connect to
malware sites.
computers in your organization that most frequently connect to
malware sites.
Click the Chart Options link below the chart to change the display
from total Malware Connections Detected to Malware
Connections Monitored or Malware Connections Blocked.
from total Malware Connections Detected to Malware
Connections Monitored or Malware Connections Blocked.
This chart is the same as the “L4 Traffic Monitor: Malware
Connections Detected” chart on the
Connections Detected” chart on the
.
Top Malware Sites
This section displays, in graph format, the top malware domains
detected by the L4 Traffic Monitor.
detected by the L4 Traffic Monitor.
Click the Chart Options link below the chart to change the display
from total Malware Connections Detected to Malware
Connections Monitored or Malware Connections Blocked.
from total Malware Connections Detected to Malware
Connections Monitored or Malware Connections Blocked.
Client Source IPs
This table displays the IP addresses of computers in your
organization that frequently connect to malware sites.
organization that frequently connect to malware sites.
To include only data for a particular port, enter a port number into
the box at the bottom of the table and click Filter by Port. You can
use this feature to help determine which ports are used by
malware that “calls home” to malware sites.
the box at the bottom of the table and click Filter by Port. You can
use this feature to help determine which ports are used by
malware that “calls home” to malware sites.
To view details such as the port and destination domain of each
connection, click an entry in the table. For example, if one
particular client IP address has a high number of Malware
Connections Blocked, click the number in that column to view a
list of each blocked connection. The list is displayed as search
results in the L4 Traffic Monitor tab on the Web > Reporting >
Web Tracking page. For more information about this list, see
connection, click an entry in the table. For example, if one
particular client IP address has a high number of Malware
Connections Blocked, click the number in that column to view a
list of each blocked connection. The list is displayed as search
results in the L4 Traffic Monitor tab on the Web > Reporting >
Web Tracking page. For more information about this list, see
.
This table is the same as the “L4 Traffic Monitor - Clients by
Malware Risk” table on the
Malware Risk” table on the
.