Fortinet black logo

Wireless Manager (FortiWLM) 8.5.1 Beta 1 Administration Guide

6.4.0

Monitor

Monitor

The Monitor tab allows you to monitor network traffic by applications and users (clients). You can filter to view the applications and users either by Controllers or AP Groups, and then selecting the desired APs and/or ESSIDs. The most recent top applications and users are displayed in separate panels below the filtering options on the Monitor tab. Applications and users can be monitored either by usage or by risk.

Monitoring by usage

You can monitor network traffic by usage for applications or users by clicking on the By Usage tab within the RECENT TOP APPLICATIONS or RECENT TOP USERS panels. Each of these panels display a pie chart and a table with data from the top ten applications or users.

Hover over the pie slices to see traffic usage in percentage of an application or a user.

The table in the RECENT TOP APPLICATIONS panel enlists the top ten applications, Detected and Blocked, for each of which you can view the following:

  • Application Name
  • Number of users using the application
  • Number of APs serving the users using the application
  • Number of ESSIDs of users using the application
  • Total traffic utilization in MB
  • The associated risk level of the application

The table in the RECENT TOP USERS panel enlists the top ten users, for each of which you can view the following:

  • Serial Number
  • Number of applications used
  • Number of APs serving the users using the application
  • Number of ESSIDs of users using the application
  • Total traffic utilization in MB
Monitoring by risk

Click the By Risk tab within each of the panels to group applications and users based on their risk values and usage information. Applications and users are assigned with low, elevated, medium, high, or critical risk values.

The pie charts group the applications and users based on their risk values. Click on each of these risk values on the pie chart to view the top ten applications/users in that category along with their usage.

Each of the tables in both the panels display the total traffic utilization along with either the application name or the serial number, depending upon which panel you are monitoring by risk.

Monitor

The Monitor tab allows you to monitor network traffic by applications and users (clients). You can filter to view the applications and users either by Controllers or AP Groups, and then selecting the desired APs and/or ESSIDs. The most recent top applications and users are displayed in separate panels below the filtering options on the Monitor tab. Applications and users can be monitored either by usage or by risk.

Monitoring by usage

You can monitor network traffic by usage for applications or users by clicking on the By Usage tab within the RECENT TOP APPLICATIONS or RECENT TOP USERS panels. Each of these panels display a pie chart and a table with data from the top ten applications or users.

Hover over the pie slices to see traffic usage in percentage of an application or a user.

The table in the RECENT TOP APPLICATIONS panel enlists the top ten applications, Detected and Blocked, for each of which you can view the following:

  • Application Name
  • Number of users using the application
  • Number of APs serving the users using the application
  • Number of ESSIDs of users using the application
  • Total traffic utilization in MB
  • The associated risk level of the application

The table in the RECENT TOP USERS panel enlists the top ten users, for each of which you can view the following:

  • Serial Number
  • Number of applications used
  • Number of APs serving the users using the application
  • Number of ESSIDs of users using the application
  • Total traffic utilization in MB
Monitoring by risk

Click the By Risk tab within each of the panels to group applications and users based on their risk values and usage information. Applications and users are assigned with low, elevated, medium, high, or critical risk values.

The pie charts group the applications and users based on their risk values. Click on each of these risk values on the pie chart to view the top ten applications/users in that category along with their usage.

Each of the tables in both the panels display the total traffic utilization along with either the application name or the serial number, depending upon which panel you are monitoring by risk.