IPsec tunnel activity

If you’ve configured IPsec tunnels as a method for directing web traffic to ETP Proxy, the IPsec Tunnel Activity report provides data on the traffic that’s transferred from your SD-WAN solution to ETP. This report shows information about the connection, including its status. The IPsec Tunnel Activity report also indicates whether the tunnel is active or inactive.

You can sort data in this report by IPsec Tunnel dimensions. You can also filter data by the following information:

  • Branch IP: IP address that’s associated with the branch and is used in the location configuration.
  • Location: Location in ETP where traffic is directed from.
  • Tunnel ID: The IKE Identifier that’s associated with the traffic. An ETP administrator configured this ID in ETP and provided it as part of the SD-WAN configuration.

IPsec tunnel dimensions

These dimensions are available in the IPsec Tunnel Activity report.

Dimension

Definition

Location

Location for the branch.

Branch IP

IP address of the branch.

​Akamai​ VIP

The virtual IP address of ETP Proxy. This is the IP address that’s associated with the primary and secondary IPsec FQDNs.

Identifier

This is the Internet Key Exchange (IKE) Identifier that you configure in ETP. It consists of a custom prefix that you configure and a predefined suffix that includes your ETP configuration ID.

Status

Indicates whether the tunnel is active and healthy.

Inbound Traffic

Average inbound traffic throughput in megabits per second (mbps) from the last five minutes.

Outbound Traffic

Average outbound traffic throughput in mbps from the last five minutes.

Total Inbound

Shows the total number of inbound connections in bytes.

Total Outbound

Shows the total number of outbound connections in bytes.

Filter IPsec tunnel activity data

Complete this procedure to filter data in the IPsec tunnel activity report.

To filter IPsec tunnel activity data:

  1. In the Threat Protection menu of Enterprise Center, select Reports > IPsec Tunnel Activity.

  2. To filter data based on date and time, see Filter data based on date and time.

  3. To configure and apply a filter, see Configure and apply a filter.

  4. Select a dimension or criteria to define what data is shown.

Add IPsec tunnel activity data to a filter

You can add a specific location or identifier to a filter.

To add IPsec tunnel data to a filter:

  1. In the Threat Protection menu of Enterprise Center, select Reports > IPsec Tunnel Activity.

  2. To filter data based on date and time, see Filter data based on date and time.

  3. To configure and apply a filter, see Configure and apply a filter.

  4. Go to the location or identifier that you want to filter by.

  5. Click the data value that you want to add to the filter. For example, if you want to add a location, click the location.

  6. Select one of these:

    • If you want the data to be part of the In filter, select Add to Include Filter. A value cannot be added to the Include Filter if it's already in the Exclude Filter.

    • If you want the data to be part of the Not In filter, select Add to Exclude Filter. A value cannot be added to the Exclude Filter if it's already in the Include Filter.


Did this page help you?