<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FirePower Reporting - Bandwidth Statistics in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3313228#M1015576</link>
    <description>&lt;P&gt;I stubbed upon this&amp;nbsp;question looking for something else, but here is how I do it:&lt;/P&gt;
&lt;P&gt;Go to Analysis -&amp;gt; Connection Events, Click Edit Search, configure the search constrain to specific Zone/Interfaces (ingress or egress).&lt;/P&gt;
&lt;P&gt;The, select the time period you want to sample, Click on "Switch Workflow", select the option "Traffic over time"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This should give you the graph you are looking for.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jan 2018 21:23:32 GMT</pubDate>
    <dc:creator>guibarati</dc:creator>
    <dc:date>2018-01-17T21:23:32Z</dc:date>
    <item>
      <title>Cisco FirePower Reporting - Bandwidth Statistics</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020513#M1015571</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;I was hoping someone could shed some light on how I can create a bandwidth report to show utilization stats for traffic entering the inside interface and existing the outside interface on my Cisco Firepower ASA.&lt;BR /&gt;&lt;BR /&gt;I currently have a 'Connection Summary Data' report showing Traffic (KB/s) against Time (see 'Report Parameters' attached) but this looks like an aggregated report for all interfaces as the KB/s shown in the report (see 'Report Output' attached) look like it is way above our Internet line speed. So I was wondering whether there was any way which a report could be created to show only traffic existing the outside interface?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020513#M1015571</guid>
      <dc:creator>John5mith</dc:creator>
      <dc:date>2019-03-12T13:24:03Z</dc:date>
    </item>
    <item>
      <title>I don't think you can do that</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020514#M1015572</link>
      <description>&lt;P&gt;I don't think you can do that with FMC.&lt;/P&gt;
&lt;P&gt;I'd suggest doing Netflow on the ASA itself and using a Netflow collector like PRTG, ManageEngine etc. to create your reports.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 08:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020514#M1015572</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-18T08:08:28Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin. You would</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020515#M1015573</link>
      <description>&lt;P&gt;Thanks Marvin. You would think that this should be possible as it seems the device is logging this data. Do you know whether anything is possible with the use of estreamer combined with a 3rd party application or is this purely for security event reporting?&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2017 16:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020515#M1015573</guid>
      <dc:creator>John5mith</dc:creator>
      <dc:date>2017-05-22T16:07:22Z</dc:date>
    </item>
    <item>
      <title>You're welcome.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020516#M1015574</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;You're right - one would think this would be a simple query that they would have pre-built reports for the administrator to use. I gave similar feedback to Cisco just last week.&lt;/P&gt;
&lt;P&gt;AFAIK, eStreamer cannot be used for this purpose. Per the eStreamer Integration Guide:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P class="pB1_Body1"&gt;The service can stream the following categories of data:&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;UL&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1058173"&gt;&lt;/A&gt;Intrusion event data and event extra data&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1070569"&gt;&lt;/A&gt;Correlation (compliance) event data&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1058174"&gt;&lt;/A&gt;Discovery event data&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1075750"&gt;&lt;/A&gt;User event data&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1070588"&gt;&lt;/A&gt;Metadata for events&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1086240"&gt;&lt;/A&gt;Host information&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;
&lt;BLOCKQUOTE&gt;&lt;A name="pgfId-1109403"&gt;&lt;/A&gt;Malware event data&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Source:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/621/api/eStreamer/EventStreamerIntegrationGuide_621/Intro.html&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 03:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020516#M1015574</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-23T03:07:53Z</dc:date>
    </item>
    <item>
      <title>Thanks again much appreciated</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020517#M1015575</link>
      <description>&lt;P&gt;Thanks again much appreciated!&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 11:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3020517#M1015575</guid>
      <dc:creator>John5mith</dc:creator>
      <dc:date>2017-05-24T11:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower Reporting - Bandwidth Statistics</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3313228#M1015576</link>
      <description>&lt;P&gt;I stubbed upon this&amp;nbsp;question looking for something else, but here is how I do it:&lt;/P&gt;
&lt;P&gt;Go to Analysis -&amp;gt; Connection Events, Click Edit Search, configure the search constrain to specific Zone/Interfaces (ingress or egress).&lt;/P&gt;
&lt;P&gt;The, select the time period you want to sample, Click on "Switch Workflow", select the option "Traffic over time"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This should give you the graph you are looking for.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 21:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3313228#M1015576</guid>
      <dc:creator>guibarati</dc:creator>
      <dc:date>2018-01-17T21:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower Reporting - Bandwidth Statistics</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3876215#M1015577</link>
      <description>&lt;P&gt;This only works if you are logging all traffic as connection events.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 17:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3876215#M1015577</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2019-06-19T17:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower Reporting - Bandwidth Statistics</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3876244#M1015578</link>
      <description>&lt;P&gt;This is correct. with the workflow the FMC will show you the information based on the "connection events" table. It will show you an aggregate graph of the "initiator bytes" or "responder bytes" depending on the graph you select.&lt;/P&gt;&lt;P&gt;Another thing I found out since my post is that you can't filter traffic based on source or destination zones for the graphs. You can use source/destination zones on the connection events table, but not on the graphs.&lt;/P&gt;&lt;P&gt;When you open the "search" page for the connection events it will show you an asterisk "*" on the fields that can be used as search constrains on the graphs and src/dst zones are not one of them. So you would have to use something like the subnet IPs that are related to each zone to get the bandwidth for specific zone pairs.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 18:05:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/3876244#M1015578</guid>
      <dc:creator>guibarati</dc:creator>
      <dc:date>2019-06-19T18:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FirePower Reporting - Bandwidth Statistics</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/4603980#M1089768</link>
      <description>&lt;P&gt;I have traffic graphing on the Firepower Threat devices. You have to use the LINA OS partition using the FTD management interface.&lt;/P&gt;&lt;P&gt;This works on everything except the Azure or AWS virtual FTD's. I use CACTI for traffic graphing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 19:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-reporting-bandwidth-statistics/m-p/4603980#M1089768</guid>
      <dc:creator>cyborgzhouse</dc:creator>
      <dc:date>2022-05-03T19:19:07Z</dc:date>
    </item>
  </channel>
</rss>

