117
Reports and Queries
About querying flows
About querying flows
FlowChaser serves as a data source in coordination with Symantec Network
Security TrackBack, a response mechanism that traces a DoS attack or network
flow back to its source. The FlowChaser database can be queried for flows by
port and arbitrary address. The Network Security console
displays both current
flow data and exported flow data, and provides secondary query options from
the results page.
Symantec Network Security
provides query options as follows:
■
In Query Current Flows or Query Exported Flows
■
In Event Details, right-click the IP address to see the flow statistics
■
In Event Details of an Exported Related Flows, exported flows are displayed
The Network Security console retrieves a limited number of records for each
query, which prevents overloading memory, and displays the results in a table.
If more results are available, click Next Results to proceed.
Viewing current flows
View Current Flows enables you to search against all of the collected flows by
FlowChaser. These flows are stored in memory so they are not persistent.
To query current flows
1
In the Network Security console, click
Flow
>
View Current Flows
.
Flows by source port
This report lists the source ports of flows found on
devices with Flow Status Collection sensor mode enabled.
You can generate this report from within the Devices with
Flow Statistics report.
Flows by destination port
This report lists the destination ports of flows found on
devices with Flow Status Collection sensor mode enabled.
You can generate this report from within the Devices with
Flow Statistics report.
Flows by protocol
This report lists the protocols of flows found on devices
with Flow Status Collection sensor mode enabled. You
can generate this report from within the Devices with
Flow Statistics report.
Table 9-6
Drill-down-only reports
Report
Description
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...