Hosts

From the menu tree, click on Hosts.

This window lists the connected hosts.

“Hosts” tab

Figure 36: Hosts

 

This screen consists of 3 views:

  • A view listing the hosts
  • A view that lists the Vulnerabilities, Applications, Information, Connections and Events relating to the selected host
  • A hidden help view that you can display by clicking on "Show help" (top left of the screen). This allows working around the selected vulnerability, if a solution exists.

"Hosts" view

This view shows all hosts detected by the firewall. Every row represents a host.

The "Hosts" view displays the following data:

Name

Name of the sending host (if declared in objects) or IP address of the host (if not declared).

Address

IP address of the host.

Users

User logged on to the host (if any).

MAC address

MAC address of the host.

Operating system

Operating system used on the host.

Vulnerabilities

Number of vulnerabilities detected.

Applications

Number of applications on the host (if there are any).

Events

Number of detected events.

Open ports

Number of open ports.

Vulnerability Manager

Indicates the date and time of the last Vulnerability Manager event.

Interface

Interface to which the user belongs.

Bytes in

Number of bytes that have passed through the firewall from the sending host ever since the firewall started running.

Bytes out

Number of bytes that have passed through the firewall towards the sending host ever since the firewall started running.

Incoming throughput

Actual throughput of traffic to the host passing through the firewall

Outgoing throughput

Actual throughput of traffic from the host passing through the firewall

Host reputation Host's reputation score This column will only contain data when host reputation management has been enabled and the selected host is a monitored host.

 

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • Remove host from ASQ,
  • Reset Vulnerability Manager information,
  • Send to quarantine,
  • Manually set the Operating System
  • Add the host to the Object base,
  • Ping host,
  • Traceroute to source host.

 

"Vulnerabilities" view

For a selected host, this tab will describe the vulnerabilities detected. Each vulnerability can then later be viewed in detail.

Description: Screenshot - 07_12_2011 , 14_51_21

Figure 37: Hosts – Vulnerabilities

 

The "Vulnerabilities" view displays the following data:

Severity

Indicates the level of severity on the host(s) affected by the vulnerability. There are 4 levels of severity: "Low", "Moderate", "High", "Critical".

Name of the application

Name of the software as well as its version, if available.

Name

Indicates the name of the vulnerability.

Family

Number of hosts affected.

Type

Software type (Client: the software does not provide any service – Server: the software application provides a service).

Details

One of 2 targets: "Client" or "Server".

Assigned

Family to which the vulnerability belongs.

Exploit

Access may be local or remote (via the network). It allows exploiting the vulnerability.

Workaround

Indicates whether a workaround exists.

Port

Date on which the vulnerability was detected.

WARNING

This refers to the discovery date and not the date on which the vulnerability appeared on the network.

Internet Protocol

Name of the protocol used.

ID

Vulnerability ID

 

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • View hosts with the same vulnerability

 

"Application" view

Description: Screenshot - 07_12_2011 , 14_56_44

Figure 38: Hosts – Applications

 

For a selected host, this tab will describe the applications detected. It is possible to view applications in detail later.

The "Application" view displays the following data:

Version

Name and version of the application.

Vulnerability

Number of vulnerabilities detected on the application.

Family

The software application’s family.

Type

Application type (Client: the software does not provide any service – Server: the software application provides a service).

Port

Port used by the application (if it uses one).

Protocol

Protocol used by the application

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • View all hosts that use this application,
  • View the vulnerabilities for this application,
  • Impose a server application.

“Information” view

This tab provides information relating to a given host.

Description: Screenshot - 07_12_2011 , 15_11_48

Figure 39: Hosts – Events

REMARK

The number of events is displayed in the tab’s name.

 

The "Information" view displays the following data:

Name

Name of the detected OS.

Family

Family of the vulnerability that is likely to appear (Example: SSH).

Type

Application type (Client: the software does not provide any service – Server: the software application provides a service).

Details

Description of information.

Assigned

Date and time of detection.

Port

Number of the port on which the vulnerability had been detected.

Protocol

Name of the protocol used.

ID

Unique identifier of the vulnerability family.

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • View hosts with the same information.

 

"Connections" view

Description: C:\Documentations\Modifications\Guide\RealTimeMonitor\Images-FR\Figure41.png

Figure 40: Hosts - Connections

 

This view shows all connections detected by the firewall. Every row represents a connection. The "Connections" view displays the following data:

Time

Indicates the date and time of the object's connection.

Protocol

Communication protocol used for the connection.

Source

Name of the object that connected to the selected host.

Source MAC address

MAC address of the object at the source of the connection

Source port

Number of the source port used for the connection

Source interface

Name of the interface on the firewall on which the connection was set up.

Destination

Name of the object for which a connection has been established.

Destination MAC address

MAC address of the object at the destination of the connection.

Average throughput

Average value calculated by the amount of data exchanged divided by the length of the session.

Destination Port

Number of the destination port used for the connection

Destination interface

Name of the destination interface used by the connection on the firewall.

Data sent

Number of bits sent during the connection.

Data received

Number of bits received during the connection.

Duration

Connection time.

Router

ID assigned by the firewall to the router used by the connection

Router name

Name of the router saved in the objects database used by the connection

Policy

Name of the policy that allowed the connection

Rule

ID name of the rule that allowed the connection

Operation

Identified command of the protocol.

Parameter

Operation parameter.

Status

This parameter indicates the status of the configuration corresponding, for example, to its initiation, establishment or closure.

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • Ping source host,
  • Traceroute to source host,
  • Ping destination host,
  • Traceroute to destination host,
  • Send connection to quarantine.

 

“Events” view

Description: C:\Documentations\Modifications\Guide\RealTimeMonitor\Images-FR\Figure42.png

Figure 41: Hosts - Events

This view allows you to view all the events that the firewall has detected. Each line represents an alarm. The information provided in the “Events” view is as follows:

Date

Date and time the line was recorded in the log file at the firewall’s local time.

Logs

Source of the event.

Action (action)

Action associated with the filter rule and applied to the packet (Examples: Block/Pass, etc.)

Priority

Determines the alarm level. The possible values are:

0: emergency

1: alert

2: critical

3: error

4: warning

5: notice

6: information

7: debug

Config

Name of the application inspection profile that reported the event.

Policy

Name of the SMTP, URL or SSL filter policy that raised the alarm.

User

Identifier of the user requesting authentication

Protocol

Protocol of the packet that set off the alarm.

Source

IP address or name of the object corresponding to the source host of the packet that set off the event.

Source MAC address

MAC address of the object at the source of the connection

Src prt num

Port number of the source (only if TCP/UDP).

Destination

IP address or name of the object corresponding to the destination host of the packet that set off the event.

Destination Port

Port requested for this connection (in letters, e.g.: http).

Dst. port (num)

Destination port requested for this connection (in numerals, e.g.: 80).

Details

Describes the event relating to the log. This description groups information from other columns in a single column. Example: if it is an alarm log, information such as whether the alarm is sensitive, the filter rule number and rule identifier will be indicated in this column or will otherwise be new columns in order to enable filtering.

Please refer to the “Audit logs” technical note.

Source IP reputation

Reputation category of the public IP address at the source of the traffic. This column will only contain data if this IP address is public and listed in the IP address reputation database.

The possible values are: "anonymizer", "botnet", "malware", "phishing", "tor", "scanner" or "spam".

Source host reputation Reputation score of the host at the source of the traffic. This column will only contain data when host reputation management has been enabled and the selected host is a monitored host.
Destination IP address reputation

Reputation category of the public IP address at the destination of the traffic. This column will only contain data if this IP address is public and listed in the IP address reputation database.

The possible values are: "anonymizer", "botnet", "malware", "phishing", "tor", "scanner" or "spam".

Destination host reputation Reputation score of the host at the destination of the traffic. This column will only contain data when host reputation management has been enabled and the selected host is a monitored host.

For the description of additional data available by column title, please refer to the section EVENTS.

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • Ping source host,
  • Traceroute to source host,
  • Ping destination host,
  • Traceroute to destination host,

“Incoming filter rules” view

This view allows listing the incoming filter rules that can be applied to the selected host. Block rules are shown in red. Ignored rules are grayed out.

“Outgoing filter rules” view

This view allows listing the outgoing filter rules that can be applied to the selected host. Block rules are shown in red. Ignored rules are grayed out.

“DHCP leases” tab

This tab displays all hosts that have a lease in progress or which has ended and specifies the state of this lease. The information provided in the DHCP leases tab is as follows:

IP address

IP address of the host.

Name

Name of the host that has a lease in progress or which has ended (if declared in objects) or host’s IP address otherwise.

Status

The status of the lease can be:

  • Active: the address has been assigned to a host and the assignment is still in progress.
  • Free: the lease has expired, and the address can be reused for another lease.

From

Starting date and time of the lease assignment.

Until

Ending date and time of the lease assignment. This can be a date and time in the past or future

MAC address

Physical network identifier of the host with an ongoing or lapsed lease.

REMARK
The leases assigned by reservation (static IP address reserved exclusively for a MAC address) are not displayed on this screen.

REMARK
When a new host logs on to a network, it will send a first request (DHCPDISCOVER) to the whole network to find out where the DHCP servers are. Upon reception, the DHCP server will pre-reserve an IP address and sends it to the host (DHCPOFFER). It is possible, however, that this host already uses the address range of another DHCP server. During this pre-reservation period (2 minutes), the IP address will no longer be available but will appear in the list as “free”. If many pre-reservations are made within a short period, the server may run out of available addresses while the screen continues displaying “free” addresses.

 

The Actions button makes it possible to perform certain actions on the selected event (for further information, please refer to the section Pop-up menu on rows):

  • Display host,
  • Ping source host,
  • Traceroute to source host.