Live connections IPv6

You can see the connection details of IPv6 traffic by the application, username, and source IP address.

You can see the data transferred from the time the connection was established, the live data transfer, the number of connections, and traffic details.

The bandwidth used both upstream and downstream by an application is calculated by dividing the total number of bytes transferred by the time period.

The time period is the elapsed time since the connection was created. A connection is active longer than the application's use of the connection. So, the average bandwidth shown is always lower than the total sum of the bandwidth averages.

  • To see the number of current connections, see Live connections at the upper-left corner of the section.
  • To see the live connection details, select Application, Username, or Source IP address.
  • To see all the items in a group, click Expand Expand button.
  • Under Total connections, click the number to see the connection details, such as the start time, inbound and outbound interfaces, source and destination ports and IP addresses, protocols, firewall and NAT rule IDs in addition to the total and live data transfer. Move right to see all the columns.

    The Characteristics column shows the application details, for example application category, usage.

    Traffic from any zone enters through an inbound interface and exits through an outbound interface.

  • To refresh the connection details automatically, select a value from Automatic refresh interval.
  • To refresh the details manually, click Refresh.
  • To sort the table, click a column heading.
  • To apply a filter, click Filter Filter button, then select a modifier, and enter the search phrase. You can apply one filter at a time. To clear an existing filter, click Clear.

Other applications: The category lists unrecognized applications along with the rule ID of the applied firewall rule. It also lists system-generated traffic between XG Firewall and any zone. The rule ID is set to zero because firewall rules don't apply to this traffic.

Example: DNS queries and replies when XG Firewall is the DNS server, signature downloads, traffic accessing the appliance consoles, DNAT traffic.

System-generated DNS traffic is listed in both these categories: DNS and Other applications. DNS traffic to which firewall rules apply is listed only in the DNS category. You can identify this traffic by the firewall rule ID.

Example: Traffic between an internal source and external DNS servers.