Create application mapping rules to identify traffic in reports. Rules can identify traffic types such as a ToS, host, subnet, or NBAR2 application.
You can use application mapping to combine, differentiate, or more clearly identify traffic in reports:
For example, suppose reports show a large block of FTP traffic on TCP port 20. You want to track the FTP traffic from your internal FTP server separately from internet traffic. To accomplish this, you create a Host application mapping rule, which you name Internal FTP Traffic. The Host value of the rule matches the IP address of the internal FTP server. The Port value is 20. You specify 65000 as the Destination Port--a port that does not currently receive any traffic.
Reports now show traffic from the FTP server on TCP port 65000 with the label Internal FTP Traffic. Other TCP port 20 traffic is still labeled FTP.
For example, suppose your enterprise mail systems use the IMAP and POP protocols. The IMAP mail uses TCP port 443 and the POP mail uses TCP ports 109 and 100. You want reports to show the combined mail traffic, so you create application mapping rules that re-map each type of mail traffic to port 3100. The traffic is combined in reports and is labeled with the rule name, Mail. Even though you created several rules, the program uses the same name for all of the rules that map traffic to port 3100.
Application mapping affects the following reports:
Notes:
To continue the example for differentiating types of FTP traffic, the Flow Forensics Session Protocols reports show the FTP traffic as it was before you mapped the FTP sub-category.
The Flow Forensics reports that display NBAR2 data show the official application name and ID regardless of any application mapping rules that you have.
You can perform the following application mapping tasks:
|
Copyright © 2013 CA.
All rights reserved.
|
|