Customer/Network reports

The Customer Reports provide visibility into network-wide alerts, usage trends, inventory, quality, diagnostics, and firewall status aggregated across all the sites in a customer network.

To view the reports, navigate to Partner > Provider > Customer > Reports.

Customer network reports

Alerts

The customer can review a detailed report of all the events and alerts generated across all the sites in this network.

It includes the severity, site at which the alert originated, alert message, time, and other details.

Customer and network reports alerts

Suitable filtering options can be used as needed for example: Look for all the high severity alerts across all the sites, or all the alerts for a particular site and so on.

You can also select and clear alerts.

Usage

Customers can review usage trends such as Top Applications, Top Application Categories, App Bandwidth, and Top Sites across all the sites in their network.

Top application and application categories

The Top Applications and Top Application Categories chart shows the top applications and top application families that are widely used across all the sites. This allows you to analyze the data consumption pattern and reassign bandwidth limit for each class of data within the network.

Reports top apps

Reports top app categories

Application bandwidth

You can view the bandwidth usage statistics for the selected site group or for all sites. The bandwidth statistics are collected for the selected time interval. You can filter the statistics report based on the Report Type, Apps or Apps Categories, and Metrics.

Reports app bandwidth

  • Report Type: Select Top App or App Categories from the list.
  • Apps/App Categories: Select top application or categories (such as network service) from the list.
  • Metric: Select the bandwidth metric (such as Total Data, Incoming Data, Total Bandwidth) from the list.

Network usage

The Top Sites chart depicts the top sites in the customer network that have the highest bandwidth usage. You can view the Sites by Utilization (%) or Traffic Volume (MB).

Network top sites

Inventory

The customer can view the entire device inventory across all the sites in the network. You can choose to view an inventory summary or a detailed view.

The inventory summary view provides a chart of the inventory spread, depicting the various appliance models and the number of each type of appliances used across all sites in the customer network.

Customer network reports inventory summary

Suitable filtering options can be used as needed for example: Look for all appliances belonging to a specific site, or all appliances with a certain device model and so on

The inventory detailed view provides a list of all the appliances that are deployed and those appliances that are configured but not deployed yet. Along with the customer, site name, device role, device serial number, current software, and device management IP address.

Customer network reports inventory detail

Quality

The Network Quality Report enables a network-level comparison between the virtual overlay and the physical underlay in terms of uptime, loss, latency, and jitter. This helps effectively monitor how the overlay is faring relative to the underlay network, and also aids troubleshooting.

Customer network report quality

Quality of Service

Quality of Service (QoS) manages data traffic to reduce packet loss, latency, and jitter on the network. For more information, see Quality of service. The following are two ways to view the Quality-of-Service (QoS) report:

  • Summary View: Summary view provides an overview of bandwidth consumption across all types of traffic - real-time, interactive, bulk, and control across the network and per site.

    Qos summary view

    • Real-time: Used for low latency, low bandwidth, time-sensitive traffic. Real-time applications are time sensitive but don’t really need high bandwidth (for example voice over IP). Real-time applications are very sensitive to latency and jitter, but can tolerate some loss.

    • Interactive: Used for interactive traffic with low to medium latency requirements and low to medium bandwidth requirements. Interactive applications involve human input in the form of mouse clicks or cursor moves. The interaction is typically between a client and a server. The communication might not need high bandwidth but is sensitive to loss and latency. However, server to client does need high bandwidth to transfer graphical information, which might not be sensitive to loss.

    • Bulk: Used for high bandwidth traffic that can tolerate high latency. Applications that handle file transfer and need high bandwidth are categorized as bulk class. These applications involve very little human interference and are mostly handled by the systems themselves.

    • Control: Used to transfer control packets that contain routing, scheduling, and link statistics information.

  • Detailed View: The detailed view captures trends around bandwidth consumption, traffic volume, packets dropped and so on. For each QoS class associated with an overlay virtual path.

    Qos detailed view

This report is available at the site level where the user can view QOS statistics based on virtual path between two sites. For more information see Site reports.

Historical statistics

For each site, you can view statistics as graphs for the following network parameters:

  • Virtual Paths
  • Paths
  • WAN Links
  • Interfaces
  • Classes
  • Services
  • GRE Tunnels
  • IPsec Tunnels

The statistics are collected as graphs. These graphs are plotted as timeline versus usage, allowing you to understand the usage trends of various network object properties. You can view graphs for network-wide application statistics.

You can view or hide the graphs and customize the columns as needed.

Virtual paths

To view the Virtual Paths statistics, navigate to Reports > Statistics > Virtual Paths tab.

Virtual path stats network

You can view the following metrics:

  • Virtual Path Name: The virtual path name.
  • Latency: The latency in milliseconds for real time traffic.
  • Loss: Percentage of packets lost.
  • Jitter: Variation in the delay of received packets, in milliseconds.
  • Bandwidth Ingress: Ingress (LAN > WAN) Bandwidth usage for the selected time period.
  • Control Bandwidth: Bandwidth used to transfer control packets that contain routing, scheduling, and link statistics information.
  • Real-time Bandwidth: Bandwidth consumed by applications that belong to the real-time class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency. A delayed packet is worse than a lost packet (for example, VoIP, Skype for Business).
  • Interactive Bandwidth: Bandwidth consumed by applications that belong to the interactive class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency, and packet loss (for example, XenDesktop, XenApp).
  • Bulk Bandwidth: Bandwidth consumed by applications that belong to the bulk class type in the SD-WAN configuration. These applications involve very little human intervention and are mostly handled by the systems themselves (for example, FTP, backup operations).
  • Expand/Collapse: You can expand or collapse the data as needed.

Paths

To view the Paths statistics, navigate to Reports > Statistics > Paths tab.

Paths network

You can view the following metrics:

  • From WAN Link: The source WAN link.
  • To WAN Link: The destination WAN link.
  • Latency: The latency in milliseconds for real time traffic.
  • Loss: Percentage of packets lost.
  • Jitter: Variation in the delay of received packets, in milliseconds.
  • Bandwidth: Total bandwidth consumed by all packet types. Bandwidth= Control Bandwidth + Real-time Bandwidth + Interactive Bandwidth + Bulk Bandwidth.
  • Control Bandwidth: Bandwidth used to transfer control packets that contain routing, scheduling, and link statistics information.
  • Real-time Bandwidth: Bandwidth consumed by applications that belong to the real-time class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency. A delayed packet is worse than a lost packet (for example, VoIP, Skype for Business).
  • Interactive Bandwidth: Bandwidth consumed by applications that belong to the interactive class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency, and packet loss (for example, XenDesktop, XenApp).
  • Bulk Bandwidth: Bandwidth consumed by applications that belong to the bulk class type in the SD-WAN configuration. These applications involve very little human intervention and are mostly handled by the systems themselves (for example, FTP, backup operations).
  • Expand/Collapse: You can expand or collapse the data as needed.

To view the statistics at WAN Link level, navigate to Reports > Statistics > WAN Links tab.

Wan link network

You can view the following metrics:

  • WAN Link Name: The path name.
  • Bandwidth Ingress: Ingress (LAN > WAN) Bandwidth usage for the selected time period.
  • Bulk Bandwidth Ingress: Ingress (LAN > WAN) Virtual Path Bandwidth used by Bulk traffic for the selected time period.
  • Control Bandwidth Ingress: Ingress (LAN > WAN) Virtual Path Bandwidth used by Control traffic for the selected time period.
  • Control Packet Ingress: Ingress (LAN > WAN) Virtual Path Control packets for the selected time period.
  • Interactive Bandwidth Ingress: Ingress (LAN > WAN) Virtual Path Bandwidth used by Interactive traffic for the selected time period.
  • Max Bandwidth Ingress: Max Ingress (LAN > WAN) Bandwidth used in a minute for the selected time period.
  • Min Bandwidth Ingress: Min Ingress (LAN > WAN) Bandwidth used in a minute for the selected time period.
  • Expand/Collapse: You can expand or collapse the data as needed.

Interfaces

The Interfaces statistic report helps you during troubleshooting to quickly see whether any of the ports are down. You can also view the transmitted and received bandwidth, or packet details at each port. You can also view the number of errors that occurred on these interfaces during a certain time period.

To view Interface statistics, navigate to Reports > Statistics > Interfaces tab.

Interface network

You can view the following metrics:

  • Interface Name: The name of the Ethernet interface.
  • Tx Bandwidth: Bandwidth transmitted.
  • Rx Bandwidth: Bandwidth received.
  • Errors: Number of errors observed during the selected time period.
  • Expand/Collapse: You can expand or collapse the data as needed.

Classes

The virtual services can be assigned to particular QoS classes, and different bandwidth restraints can be applied to different classes.

To view Class statistics, navigate to Reports > Statistics > Classes tab.

Classes network

You can view the following metrics:

  • QoS Class: The class name.
  • Bandwidth: Transmitted bandwidth.
  • Data Volume: Data sent, in Kbps.
  • Drop Volume: Percentage of data dropped.
  • Drop Percent: Percentage of data dropped.
  • Expand/Collapse: You can expand or collapse the data as needed.

Services

To view the Services statistics, navigate to Reports > Statistics > Services tab.

Select the service type from the list. The options are as follows:

  • Passthrough – This service manages traffic that is to be passed through the Virtual WAN. Traffic directed to the Passthrough Service includes broadcasts, ARPs, and other non-IPv4 traffic, and traffic on the Virtual WAN Appliance local subnet, configured subnets, or Rules applied by the Network Administrator. This traffic is not delayed, shaped, or changed by the SD-WAN. Therefore, you must ensure that Passthrough traffic does not consume substantial resources on the WAN links that the SD-WAN Appliance is configured to use for other services.

  • Intranet – This service manages Enterprise Intranet traffic that has not been defined for transmission across a Virtual Path. As with Internet traffic, it remains unencapsulated, and the SD-WAN manages bandwidth by rate-limiting this traffic relative to other service types during times of congestion. Under certain conditions, and if configured for Intranet Fallback on the Virtual Path, traffic that ordinarily travels with a Virtual Path can instead be treated as Intranet traffic, to maintain network reliability.

  • Internet – This service manages traffic between an Enterprise site and sites on the public Internet. Traffic of this type is not encapsulated. During times of congestion, the SD-WAN actively manages bandwidth by rate-limiting Internet traffic relative to the Virtual Path, and Intranet traffic according to the SD-WAN configuration established by the Administrator.

Services

You can view the following metrics:

  • Site Name: The site name.
  • Bandwidth Ingress: Ingress (LAN > WAN) Bandwidth usage for the selected time period.
  • Packet Ingress: (LAN > WAN) Packets sent for the selected time interval.
  • Expand/Collapse: You can expand or collapse the data as needed.

GRE tunnels

You can use a tunneling mechanism to transport packets of one protocol within another protocol. The protocol that carries the other protocol is called the transport protocol, and the carried protocol is called the passenger protocol. Generic Routing Encapsulation (GRE) is a tunneling mechanism that uses IP as the transport protocol and can carry many different passenger protocols.

The tunnel source address and destination address are used to identify the two endpoints of the virtual point-to-point links in the tunnel. For more information about configuring GRE tunnels on Citrix SD-WAN appliances, see GRE Tunnel.

To view GRE Tunnel statistics, navigate to Reports > Statistics > GRE Tunnels tab.

You can view the following metrics:

  • Site Name: The site name.
  • Tx Bandwidth: Bandwidth transmitted.
  • Rx Bandwidth: Bandwidth received.
  • Packet Dropped: Number of packets dropped, because of network congestion.
  • Packets Fragmented: Number of packets fragmented. Packets are fragmented to create smaller packets that can pass through a link with an MTU that is smaller than the original datagram. The fragments are reassembled by the receiving host.
  • Expand/Collapse: You can expand or collapse the data as needed.

IPsec tunnels

IP Security (IPsec) protocols provide security services such as encrypting sensitive data, authentication, protection against replay, and data confidentiality for IP packets. Encapsulating Security Payload (ESP), and Authentication Header (AH) are the two IPsec security protocols used to provide these security services.

In IPsec tunnel mode, the entire original IP packet is protected by IPsec. The original IP packet is wrapped and encrypted, and a new IP header is added before transmitting the packet through the VPN tunnel. For more information about configuring IPsec tunnels on Citrix SD-WAN appliances, see IPsec Tunnel Termination.

To view IPsec Tunnel statistics, navigate to Reporting > statistics > IPsec Tunnels tab.

You can view the following metrics:

  • Tunnel Name: The tunnel name.
  • Tunnel State: IPsec tunnel state.
  • MTU: Maximum transmission unit—size of the largest IP datagram that can be transferred through a specific link.
  • Packet Received: Number of packets received.
  • Packets Sent: Number of packets Sent.
  • Packet Dropped: Number of packets dropped, because of network congestion.
  • Bytes Dropped: Number of bytes dropped.
  • Expand/Collapse: You can expand or collapse the data as needed.

Real time statistics

You can also get the following real time statistics information under Troubleshooting > Statistics:

  • ARP
  • Routes
  • Ethernet
  • Observed Protocols
  • Application
  • Rules

Real time stats network

Flows

At the network level, select the site from drop-down before you can fetch the statistics. The Flows feature provides unidirectional flow information related to a particular session going through the appliance. This provides information on the destination service type the flow is falling into and also the information related to the rule and class type and also the transmission mode.

Flows network

Firewall connections

At the network level, select the site from drop-down before you can fetch the statistics. The Firewall connections provide state of the connection related to a particular session based on the firewall action configured. Firewall connetions also provide complete details about source and destination of the connection.

Firewall connections network