Chapter 16. Dashboard

Unlike traditional UTM’s data presentation, the NG-UTM’s Dashboard (Threat Intelligence Dashboard Center) provides information on network traffic, content, and hacker attack-defense records in a graphical way. It facilitates drill-down analysis, making it easier for administrators to identify the root causes of issues.
_images/image532.png
Upon entering the Dashboard’s homepage, there are module switches at the top. Among them, “Functional Configuration” switches back to the traditional management interface.
The following functions can be operated:
1. Time: Choose between the 24-hour mode or custom range.
2. Ranking: Set the statistical ranking quantity for each item. The default is 10, indicating the display of the top 10 data.
3. IPV4/IPV6: Switch between the current address.
4. PNG/PDF: Download the current displayed statistical data in the selected file format.
5. Refresh: Refresh the page.

Tip

Video Reference | Introduction to NG-UTM NU Series Dashboard Introduction | Dashboard Reports and Distribution

16-1. Threat Intelligence

Display the attack-defense records of NG-UTM. The threat intelligence on the homepage is divided into real-time information and categorized attack-defense information by risk type. Real-time information shows today’s highest connections, suspicious connections, etc. The categorized attack-defense information can list virus protection, spam emails, IPS, firewall protection, and various controls according to today or this month, with a simple comparison with the last five months’ data.
Threat Intelligence Dashboard

Figure 16-1 Threat Intelligence Dashboard

The threat intelligence on the homepage is a summary of statistics. For more detailed information, clicking the threat intelligence icon above will open a new window displaying more complete information, including area charts, pie charts, and ranking lists of various risk types.

16-2. Flow Analysis

NG-UTM is based on Deep Packet Inspection (DPI). Every network connection of each inbound and outbound device is identified for its used application and its usage statistic.
The traffic analysis (Application) on the Dashboard presents these statistical data in a graphical interface.
Applications Dashboard

Figure 16-2 Applications Dashboard

Area Chart: Summarize the total upload/download traffic passing through NG-UTM in the past 24 hours, with each hour as the basic unit. After clicking on the statistical number of each hour, the Dashboard will list the usage distribution of all applications during that hour.
Pie Chart: Show the distribution ratio of each application.
Top 10 Application Traffic: List the top 10 applications with the most usage in the past 24 hours. Clicking on the type of application will automatically analyze its distribution in the past 24 hours on the area chart.
Clicking on the detailed field icon of each application will display more detailed statistical analysis. Taking HTTPS as an example:
Application Usage Analysis

Figure 16-4 Application Usage Analysis

Clicking on each IP address’s detailed field icon will display where this source IP address used HTTPS and the usage amounts.
Application Source/Destination IP Address Usage Analysis

Figure 16-5 Application Source/Destination IP Address Usage Analysis

Top 10 IP Address Traffic: List the top 10 source or destination IP addresses with the largest usage in the past 24 hours. After clicking on the IP address, the system will automatically analyze its distribution in the past 24 hours on the area chart, like the query method based on applications, but this is based on source/destination IP addresses.

16-3. Sessions

NG-UTM allows viewing real-time connections for all traffic, classifying each application, and statistically analyzing real-time connection numbers for each source IP address. This feature makes it easier to identify users with abnormal connections.
In the dynamically displayed graph, by default, the system calculates the proportion after summarizing all quantities. If administrators want to exclude certain data from the total statistical count, they can simply click on the item next to the pie chart, and NG-UTM will automatically exclude its data and recompute the distribution.
Real-time Connection Statistic

Figure 16-6 Real-time Connection Statistic

Pie Chart: Display the ratio based on application and connection number statistics.

16-4. Firewall Protection

To view the statistics of firewall protection, the following actions need to be confirmed in advance:
1. “Other” items in “Object > Firewall Protection” must be checked.
2. The system defaults to statistical analysis of hacker attack-defense records for the local machine. When administrators use the Policy interface for user access to the network, and one of the regulations applies firewall protection settings, the Dashboard will also count these records.
After meeting above 2 conditions, NG-UTM will automatically perform statistical analysis.
Firewall Attack-Defense Records

Figure 16-7 Firewall Attack-Defense Records

Pie Chart: Classify by attack type and display the distribution ratio.
Top 10: There are 2 categories: attack types and attacking/attacked IP addresses. Clicking on the detailed field icon image487 allows for further drill-down into more detailed information.
Firewall Detailed Records

Figure 16-8 Firewall Detailed Records

16-5. IPS

To view IPS statistics, the following actions need to be confirmed in advance:
1. The logging function in “IPS > IPS Setting” must be enabled.
2. In the Policy interface for user access to the network, there must be one regulation applied to IPS settings.
After meeting the above 2 conditions, NG-UTM will automatically perform statistical analysis.
IPS Statistics

Figure 16-9 IPS Statistics

Pie Chart: Classify by severity level of characteristics into high, medium, and low, and display in the distribution ratio.
Top 10: There are 3 categories: severity level, attack or victim IP addresses, and attack types. Clicking on the detailed field image490 allows for further drill-down into more detailed information.
IPS Attack-Defense Detailed Data

Figure 16-10 IPS Attack-Defense Detailed Data

16-6. Web

To view Web service statistics, the following needs to be confirmed:
The Policy interface for user access to the network must have one regulation with Web record checked.
After meeting this condition, NG-UTM will automatically perform statistical analysis.
Web Service Statistics

Figure 16-11 Web Service Statistics

Pie Chart: Classify by Web (including HTTP and HTTPS sums) website categories, and display the distribution ratio.
Top 10: There are 2 categories: top 10 visited websites and top 10 WEB usage. Clicking on image493 allows for further drill-down into more detailed information.
Detailed Web Distribution

Figure 16-12 Detailed Web Distribution

16-7. Web Control

To view Web Control statistics, the following needs to be confirmed:
The Policy interface for user access to the network must have one regulation with the Web record option checked.
After meeting this condition, NG-UTM will automatically perform statistical analysis.
Web Statistics

Figure 16-13 Web Statistics

Pie Chart: Statistics based on Web (including HTTP and HTTPS sums) URLs triggering the blacklist database or malicious programs.

16-8. Mail

To view MAIL statistics, several steps need to be confirmed beforehand:
1. “Mail Security > Anti-Spam > Action for Spam Mail” must have one option enabled. If administrators prefer not to change the existing mechanism but only want to analyze it, they can select “Data analysis only.”
2. In the Policy interface for user access to the network, there must be one regulation with SMTP logging enabled.
After meeting the above 2 conditions, NG-UTM will automatically perform statistical analysis.
Mail Usage Analysis

Figure 16-14 Mail Usage Analysis

Area Chart: Summarize all mail traffic entering and leaving NG-UTM over the past 24 hours, displaying statistics for normal mail, spam, virus-infected mail, failed connections, and rejected connections. Clicking on each hourly statistic will display the distribution of mail usage for that hour. Further clicking on each mail item allows for detailed usage tracking.
Hourly Mail Usage Analysis

Figure 16-15 Hourly Mail Usage Analysis

Pie Chart: Statistical analysis of five types of mail: normal, spam, virus-infected, failed connections, and rejected connections.
Top 10: There are 7 types of Top 10 statistical analyses. Clicking on image498 allows for further drill-down into more detailed information. The example below presents information about sender Peter@sharetech.com.tw sending to hotmail.com to the account sharetech-peter@hotmail.com, including sending time, subject, size, etc.
Mail Information

Figure 16-16 Mail Information

16-9. Application Control

16-10. WAF

16-11. IP Region

Statistics on the destination and source regions (by country) through NG-UTM.
IP Region Query

Figure 16-17 IP Region Query

16-12. DNS Query

Statistics on the destination and used DNS servers through NG-UTM DNS queries.
DNS Query

Figure 16-18 DNS Query

16-13. Statistics

Manually set query conditions, and after clicking on query, the information charts desired by the administrator will be displayed.
Query Statistics

Figure 16-19 Query Statistics

16-14. Reports

Generate reports from statistical information and set to send to specified administrators. After setting the SMTP server in 2-6. Notification, you can choose which account to receive the report here.
Report

Figure 16-20 Report