Cisco Cisco Prime Security Manager 9.0 データシート
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 3 of 9
Figure 5. View of New ASA Next-Generation Firewall Policies
Table 1.
Reports Available in Cisco Prime Security Manager
Report Category
Description
Specific Reports
Traffic Summary Reports Provides a high-level summary of network
traffic
● Traffic summary by transactions: details which transactions were
permitted or denied
● Traffic summary by bytes: gives a summary of received and
transmitted data
● Web versus non-web traffic summary, by transactions and bytes
Application Reports
Enables network applications to be
monitored
monitored
● Top applications by transactions
● Top applications by blocked transactions
● Detailed application table
● Top applications by blocked transactions
● Detailed application table
User Reports
Enables user activity to be monitored
● Top users by transactions
● Top users by blocked transactions
● Detailed user table
● Top users by blocked transactions
● Detailed user table
Endpoint Reports
Provides visibility into which endpoints and
operating systems are accessing the
network
operating systems are accessing the
network
● Top operating systems by transactions
● Top operating systems by blocked transactions
● Detailed operating systems table
● Location-based traffic: details which traffic comes from directly
● Top operating systems by blocked transactions
● Detailed operating systems table
● Location-based traffic: details which traffic comes from directly
connected devices versus remote-access mechanisms
URL Reports
Enables web activity to be monitored
● Top URL categories by transactions
● Top URL categories by blocked transactions
● Detailed URL table
● Top URL categories by blocked transactions
● Detailed URL table
Device Reports
Analyzes the usage of network security
devices
devices
● Top devices by transactions: shows the firewalls that are most
frequently used
● Top devices by blocked transactions: shows the firewalls that
block the most traffic
● Detailed devices table: detailed list of the firewalls, transactions
processed, and total throughput
Threat Reports
Provides more visibility into the threat
profiles in a network
profiles in a network
● Top 25 threats affecting the business environment
● Top 25 attackers and top 25 targets that are vulnerable
● Top 25 policies that are affected with the maximum number of
● Top 25 attackers and top 25 targets that are vulnerable
● Top 25 policies that are affected with the maximum number of
threats