Cisco Cisco Content Security Management Appliance M390 Guía Del Usuario
5-32
AsyncOS 10.0 for Cisco Content Security Management Appliances User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
From the Reports by User Location page you can generate reports showing the activity of local and
remote users. This allows you to easily compare local and remote activities of your users.
remote users. This allows you to easily compare local and remote activities of your users.
Tip
To customize your view of this report, see
.
Note
You can generate a scheduled report for information on the Reports by User Location page. For
information on scheduling a report, see the
information on scheduling a report, see the
.
System Capacity Page
The Web > Reporting > System Capacity page allows you to view the overall workload that is put on
the Security Management appliance by the Web Security appliances. Most importantly, you can use the
System Capacity page to track growth over time and plan for system capacity. Monitoring your Web
Security appliances ensures that the capacity is appropriate to your volumes. Over time, volume
inevitably rises and appropriate monitoring ensures that additional capacity or configuration changes can
be applied proactively.
the Security Management appliance by the Web Security appliances. Most importantly, you can use the
System Capacity page to track growth over time and plan for system capacity. Monitoring your Web
Security appliances ensures that the capacity is appropriate to your volumes. Over time, volume
inevitably rises and appropriate monitoring ensures that additional capacity or configuration changes can
be applied proactively.
The System Capacity page can be used to determine the following information:
•
Identify when Web Security appliances are exceeding recommended CPU capacity; this enables you
to determine when configuration optimization or additional appliances are needed.
to determine when configuration optimization or additional appliances are needed.
•
For troubleshooting, identify which parts of the system are using the most resources.
•
Identify response time and Proxy buffer memory.
•
Identify the transactions per second, and any connections that are outstanding.
Viewing the System Capacity Report
Procedure
Step 1
On the Security Management appliance, choose Web > Reporting > System Capacity.
Step 2
To view different types of data, click Columns and choose the data to view.
Step 3
To see the system capacity for a single appliance, click the appliance in the Web Security appliance
column in the Overview of Averaged Usage and Performance table.
column in the Overview of Averaged Usage and Performance table.
The System Capacity graphs appear for that appliance. The graphs on the page are divided into two sets:
Suspect Transactions Detected: Local
Users
Users
This section displays, in graph format, the suspect transactions
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
Suspect Transactions Summary
This section displays a summary of suspected transactions of the
local users on your system.
local users on your system.
Table 5-12
Details on the Web > Reporting > Reports by User Location Page
Section
Description