Contents

Policy Map (WatchGuard Cloud)

Policy Map is an interactive report tool that aggregates the allowed traffic through your Fireboxes and shows that allowed traffic in a visualization of the traffic flows. Each traffic flow is defined by the unique path a connection takes through the device as it is processed by policies, services, and configuration settings. Each path is represented by a traffic flow ribbon. The thickness of a traffic flow ribbon indicates how much traffic is included in that traffic flow: thicker ribbons have more bytes or connections. The color of the ribbons and nodes indicate the type and disposition of the traffic:

  • Interfaces — Blue
  • Policies — Orange
  • Disposition — Green (Allow), Red (Deny)
  • Applications and Application categories — Purple
  • Web Audit categories — Purple
  • Subscription Services — Yellow
  • Viruses, DLP rules, APT Blocker — Yellow

Policy Map includes many options to filter and pivot on the data in the traffic flows, and to further explore the details of the traffic flows. You can see information for the selected device in Policy Map for the date and time range you select.

From Policy Map, you can see:

  • Subscription Services activity
  • Application activity through policies
  • Policies in use
  • Policies that use the most bandwidth
  • Interfaces in use
  • Connections between active interfaces

The Policy Map diagrams show visualizations of multiple key concepts at the same time:

  • Links between nodes show how the data flows
  • Size of links and nodes show the number of bytes or connections
  • Color of links show the disposition of the connections (Allowed or Denied)

You can also see more detailed information about the data in the Policy Map in tooltips and pop-up dialog boxes.

If this dashboard is not available for your device, follow the steps to Enable Logging for this Dashboard.

About Policy Map Types

From the Policy Map page, you can select one of the Policy Map types to specify the information that is included in the traffic flow. Each map type includes different data nodes. For each map type, you can pivot the data to further refine the details included in the Policy Map. Pivot options are only available if the log messages from your device include data for that pivot option.

Map Types

Column Node Descriptions

Pivots
Policy Audit The default Policy Map type. Includes all connections aggregated by Source Interface, Firewall Policy, Disposition, and Destination Interface. Bytes, Connections
Subscription Services Includes all connections for the Subscription Services enabled on your devices or groups, aggregated by Source Interface, Firewall Policy, Subscription Service, Disposition, and Destination Interface. Bytes, Connections
Web Audit Includes connections that are aggregated by Source Interface, Firewall Policy, WebBlocker Category, and Disposition. Connections
Application Control Includes connections that are aggregated by Source Interface, Firewall Policy, Application Category, Disposition, and Destination Interface. Bytes, Connections
Intrusions (IPS) Includes connections that are aggregated by Source Interface, Firewall Policy, Severity Level, Disposition, and Destination Interface. Connections
Advanced Malware (APT) Includes connections that are aggregated by Source Interface, Firewall Policy, Threat Level, Disposition, and Destination Interface. Connections
Data Loss Violations (DLP) Includes connections that are aggregated by Source Interface, Firewall Policy, Rule Name, Disposition, and Destination Interface. Connections
Virus (GAV) Includes connections that are aggregated by Source Interface, Protocol, Virus Name, Disposition, and Firewall Policy. Connections

View Traffic Flows in WatchGuard Cloud

To view the traffic flows on your device, in WatchGuard Cloud:

  1. Log in to WatchGuard Cloud.
  2. Select Monitor > Fireboxes.
    The Device Manager page appears.
  3. From the Device Manager list, select a folder or a specific device.
  4. To select the report date range, click the Calendar .
  1. From the list of reports, select Dashboards > Policy Manager.
    The Policy Manager page appears, with the Policy Audit map type selected by default.

    Screen shot of the Policy Map page

  2. To show data for a specific time period:
    1. Above the Policy Map, click the currently selected time period.
      A drop-down list appears.
    2. Select a predefined period from the list or select Custom and specify a custom time period. For more information, see Filter Reports and Dashboards by Date.
      Data appears for the time range you specified.
  3. To change the information in the map, from the map type drop-down list at the top-right of the page, select an option:
    • Policy Audit
    • Subscription Services
    • Web Audit
    • Application Control
    • Intrusions (IPS)
    • Advanced Malware (APT)
    • Data Loss Violations (DLP)
    • Virus (GAV)
  4. To change the type of data that appears in the page, from the drop-down list at the top of the page, select a pivot option:
    • Bytes
    • Connections
  5. Review the information in the Policy Map.

For more information about how to use the interactive features in Policy Map, see the next section.

About the Internal-Policy Traffic Flow

When you review traffic flows in Policy Map, you might see the Internal-Policy traffic flow. Unlike the other traffic flows in Policy Map, this traffic flow does not show connections through one policy (or protocol). Instead, the Internal-Policy traffic flow includes this traffic:

  • IPSec traffic that uses the ESP or AH protocol
  • Any traffic to or from a cluster interface in a FireCluster
  • Traffic through a GRE tunnel from localhost to an IPSec tunnel
  • UDP traffic from localhost port 68 to destination port 67 (DHCP)
  • UDP traffic from destination port 67 to localhost port 68 (DHCP)
  • Traffic to or from an interface with the GRE protocol

Though the Internal-Policy traffic flow appears in Policy Map when traffic through the device meets these conditions, Internal-Policy does not appear in the list of policies for your device in Policy Manager or the Fireware Web UI.

If the settings change for any of the items that appear in the Internal-Policy traffic flow, the appearance of the traffic flow also changes. For example, if you disable an IPSec tunnel on your device, traffic and protocols for that IPSec traffic are no longer included in the Internal-Policy traffic flow.

Use Policy Map Interactive Features

After you have selected the map type and pivot options for a Policy Map, you can use the interactive features in Policy Map to see the details about the flow of traffic through your device. Each Policy Map includes a data flow for each policy that is in use and a column for each node included in the traffic flow. The columns (nodes) included in each Policy Map depend on the map type you select.

See Policy Map Information

At the top of the Policy Map page, the map type, the number of flows, bytes, and connections that are included in the map type you selected appear.

Each link ribbon between columns shows how the data flows through each column. The size of each ribbon and column indicate the number of bytes or connections for that node. The disposition of the connections (Allowed or Denied) is indicated by the color of the ribbon or column.

Screen shot of the Policy Audit Policy Map

See the Traffic Flow

To see the flow of traffic through the policies defined on your Firebox, FireCluster, or group, place your mouse cursor over a link ribbon in Policy Map.

Screen shot of the Policy Audit Policy Map page, with a single flow highlighted

The flow of the traffic is highlighted in the map and a pop-up dialog box appears, with these details:

  • The Flow ID number
  • The number of flows for the selected traffic
  • The number of connections for the traffic flow

See the Traffic Flow Details

  1. To see details about the nodes in each traffic flow, place your mouse cursor over each column that the ribbon flows through.
    A tooltip appears.
  2. To see more information about a particular node, click the node.
    A dialog box appears.

Screen shot of the Policy Audit flow details

The dialog box that appears includes:

  • The number of connections through the selected node for the selected traffic flow.
  • Some nodes also include the number of bytes sent through the traffic flow.
  • An option to filter Policy Map on the selected node in the traffic flow.

Filter Policy Map

To see only the information from a selected node in a policy flow, you can filter Policy Map on that node in the traffic flow.

In the dialog box, next to Filter on, click the blue link text.
Policy Map is filtered on the selected traffic flow.

Screen shot of the Policy Map filtered view

To clear the filters, next to Filtered On, click Clear.
The Policy Map page appears for the map type you selected.

Enable Logging for this Dashboard

To collect the data required for this dashboard:

  • In the Logging and Notification settings for all packet filters, select Send a log message for reports. For more information, see Set Logging and Notification Preferences.
  • In the General Settings for all proxy actions, select Enable logging for reports.
  • In all APT Blocker actions, select the Log check boxes for threat levels. For more information, see Configure APT Blocker.
  • In all DLP Sensor actions, select the Log check box. For more information, see Configure DLP Sensors.
  • In the Gateway AntiVirus settings for a proxy action, select the Log check boxes for all Gateway AntiVirus actions. For more information, see Configure Gateway AntiVirus Actions.
  • In the Intrusion Prevention settings, select the Log check box for threat levels with the Block and Drop actions. For more information, see Configure Intrusion Prevention.
  • In all WebBlocker actions, select the Log check box for all categories and select the When a URL is uncategorized, Log this action check box. For more information, see Configure WebBlocker Categories.

See Also

WatchGuard Cloud Device Reports List

Give Us Feedback  ●   Get Support  ●   All Product Documentation  ●   Technical Search