No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


eSight V300R009C00 Operation Guide 10

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Monitoring the Traffic

Monitoring the Traffic

eSight NTA can display top N rankings of monitored objects, such as network-wide interfaces, applications, and hosts and supports refined analysis on a single monitored object, allowing users to quickly obtain detailed information about original flows and view network-wide traffic information.




1. Monitoring Traffic from Multiple Dimensions

The traffic dashboard dynamically displays top N traffic on the entire network by application, session, interface, device, host, DSCP, and application group, as well as top N interface usage.

Top N traffic rankings by a single dimension are also displayed. All the information allows users to obtain packet statistics and traffic distribution on the entire network.

2. Creating a Traffic Forensics Task

When abnormal traffic exists on a network, you can create a traffic forensics task to view original traffic data to facilitate fault location.

For example, the IP address of an application server can be configured as the monitored object. You can create a threshold for this object. If traffic of this host exceeds this threshold repeatedly, you can view centralized, detailed session data of the host. If the data records indicate the same traffic volume and packet statistics, attacks may occur. You can create a traffic forensics task to view original flow information and determine whether a typical virus or TCP flood attack exists based on the port and TCP Flag.

Updated: 2019-09-07

Document ID: EDOC1100011877

Views: 311250

Downloads: 635

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next