Citrix SD-WAN Orchestrator

Site reports

The Site Reports provide visibility into site-level alerts, usage trends, quality, device information, and firewall statistics.

To view the reports, navigate to Partner > Provider > Customer > Site > Reports.

Alerts

The site administrator can review a detailed report of all the events and alerts generated at a site.

It includes the severity, site at which the alert originated, alert message, time, and other details.

Site reports alerts

Suitable filtering options can be used as needed for example: Look for all the high severity alerts at the site or the alerts that occurred during a particular period.

You can also select and clear alerts.

Usage

Site administrators can review usage trends such as Top Applications, Top Application Categories, and App Bandwidth in a particular site.

Top applications and application categories

The Top Applications and Top Application Categories chart shows the top applications and top application families that are widely used in the site. This allows you to analyze the data consumption pattern and reassign the bandwidth limit for each class of data within the site.

You can also view the bandwidth usage statistics. The bandwidth statistics are collected for the selected time interval. You can filter the statistics report based on the Report Type, Apps or Apps Categories, and Metrics.

Site app bandwidth

  • Report Type: Select Top App or App Categories from the list.
  • Apps/App Categories: Select top application or categories (such as network service) from the list.
  • Metric: Select the bandwidth metric (such as Total Data, Incoming Data, Total Bandwidth) from the list.

Wi-Fi

For an SD-WAN appliance configured as a Wi-Fi access point, the Wi-Fi report provides details about the signal strength, number of devices connected to Wi-Fi and the Wi-Fi data used within the site. To view a Wi-Fi report, at the site level, navigate to Reports > Wi-Fi.

Site Wi-Fi report

Signal Strength

The signal strength determines the wireless signal power level received by the wireless client. Strong signal strength indicates reliable high-speed connection. Signal strength is represented in decibels per milliwatt (dBm). The closer the value is to zero, the stronger the signal.

Signal Strength dBm
Good > or = -60 dBm
Fair > or = -75 dBm
Poor > or = -90 dBm

You can view the average signal strength, the total number of devices connected, and the number of devices with good, fair, and poor signal strength.

Signal strength

You can also select the timeline to view a graphical representation of the historic data. The graph shows the number of devices that have good, fair, and poor signal strength for the selected period.

Signal strength graph

Connected devices

The Connected devices section displays the total number of devices, at the site, that are currently connected to Wi-Fi. You can also see the number of appliances connected to each corporate or home SSID configured on the appliance. There can be a maximum of four SSIDs.

Connected devices

You can also select the timeline to view a graphical representation of the historic data. The graph shows the number of devices connected to each SSID over the selected period. Hover the mouse over a bar to view the exact number of devices connected to each SSID at specific time.

Connected devices graph

Data utilization

The Data utilization section displays the total amount of Wi-Fi data used, at the site, by the connected appliances at the current moment. You can also view the data used by devices connected to each corporate or home SSIDs.

Data utilization

You can also select the timeline to view a graphical representation of the historic data. The graph shows the amount of data used by the devices connected to each SSID over the selected period. Hover the mouse over a bar to view the exact data utilization by devices connected to each SSID for specific time.

Data utilization graph

Usage

The usage table lists the Wi-Fi users and Wi-Fi authentication failure logs at the site.

Users

The Users table lists all the Wi-Fi users at a site along with parameters such as signal strength, upload data, and download data. Click the parameter header to sort the column in descending order.

Users

Click View more to view all the Wi-Fi users at the site. You can select the period or search the list by user name.

View all users

Authentication failure logs

The authentication failure logs table displays all the Wi-Fi authentication failures at the site. You can view the MAC address and IP address of the client that is trying to connect to a specific SSID along with authentication failure time.

Authentication failure logs

Click View more to view all the authentication failure logs. You can select the period or search the list by user name.

View all authentication failure logs

Quality

Site administrators can use the Quality reports to analyze the Quality of Experience (QoE) at the site for each QoS metric such as availability, loss, latency, and jitter. The quality metric is displayed for both the overlay virtual paths and its underlying member paths.

  • Availability

    Site reports availability

  • Latency

    Site report latency

  • Loss

    Site reports loss

  • Jitter

    Site reports jitter

  • Throughput

    Site reports throughput

Quality of Service

Quality of Service (QoS) manages data traffic to reduce packet loss, latency, and jitter on the network. For more information, see Quality of Service. The following are two ways to view the Quality-of-Service (QoS) report:

  • Summary View: Summary view provides an overview of bandwidth consumption across all types of traffic - real-time, interactive, bulk, and control across the network and per site.

    Site QoS summary view

    • Real-time: Used for low latency, low bandwidth, time-sensitive traffic. Real-time applications are time sensitive but don’t really need high bandwidth (for example voice over IP). Real-time applications are sensitive to latency and jitter, but can tolerate some loss.

    • Interactive: Used for interactive traffic with low to medium latency requirements and low to medium bandwidth requirements. Interactive applications involve human input in the form of mouse clicks or cursor moves. The interaction is typically between a client and a server. The communication might not need high bandwidth but is sensitive to loss and latency. However, server to client does need high bandwidth to transfer graphical information, which might not be sensitive to loss.

    • Bulk: Used for high bandwidth traffic that can tolerate high latency. Applications that handle file transfer and need high bandwidth are categorized as bulk class. These applications involve little human interference and are mostly handled by the systems themselves.

    • Control: Used to transfer control packets that contain routing, scheduling, and link statistics information.

  • Detailed View: The detailed view captures trends around bandwidth consumption, traffic volume, packets dropped and so on For each QoS class associated with an overlay virtual path. You can view QoS statistics based on the virtual path between two sites.

    Site level QoS detailed view

Historical statistics

For each site, you can view the statistics as graphs for the following network parameters:

  • Virtual Paths
  • Paths
  • WAN Links
  • Interfaces
  • Classes
  • Services
  • GRE Tunnels
  • IPsec Tunnels

The statistics are collected as graphs. These graphs are plotted as timeline versus usage, allowing you to understand the usage trends of various network object properties. You can view graphs for network-wide application statistics.

You can view or hide the graphs and customize the columns as needed.

Virtual paths

To view the Virtual Paths statistics, navigate to Reports > Historical Statistics > Virtual Paths tab.

Virtual path stats

You can view the following metrics:

  • Virtual Path Name: The virtual path name.
  • Latency: The latency in milliseconds for real time traffic.
  • Loss: Percentage of packets lost.
  • Jitter: Variation in the delay of received packets, in milliseconds.
  • Bandwidth Upload: Upload (LAN > WAN) Bandwidth usage for the selected time period.
  • Control Bandwidth: Bandwidth used to transfer control packets that contain routing, scheduling, and link statistics information.
  • Realtime Bandwidth: Bandwidth consumed by applications that belong to the real-time class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency. A delayed packet is worse than a lost packet (for example, VoIP, Skype for Business).
  • Interactive Bandwidth: Bandwidth consumed by applications that belong to the interactive class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency, and packet loss (for example, XenDesktop, XenApp).
  • Bulk Bandwidth: Bandwidth consumed by applications that belong to the bulk class type in the SD-WAN configuration. These applications involve little human intervention and are mostly handled by the systems themselves (for example, FTP, backup operations).
  • Expand/Collapse: You can expand or collapse the data as needed.

Paths

To view the Paths statistics, navigate to Reports > Statistics > Paths tab.

Paths

You can view the following metrics:

  • From WAN Link: The source WAN link.
  • To WAN Link: The destination WAN link.
  • Latency: The latency in milliseconds for real time traffic.
  • Loss: Percentage of packets lost.
  • Jitter: Variation in the delay of received packets, in milliseconds.
  • Bandwidth: Total bandwidth consumed by all packet types. Bandwidth= Control Bandwidth + Real-time Bandwidth + Interactive Bandwidth + Bulk Bandwidth.
  • Control Bandwidth: Bandwidth used to transfer control packets that contain routing, scheduling, and link statistics information.
  • Real-time Bandwidth: Bandwidth consumed by applications that belong to the real-time class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency. A delayed packet is worse than a lost packet (for example, VoIP, Skype for Business).
  • Interactive Bandwidth: Bandwidth consumed by applications that belong to the interactive class type in the SD-WAN configuration. The performance of such applications depends on a great extent upon network latency, and packet loss (for example, XenDesktop, XenApp).
  • Bulk Bandwidth: Bandwidth consumed by applications that belong to the bulk class type in the SD-WAN configuration. These applications involve little human intervention and are mostly handled by the systems themselves (for example, FTP, backup operations).
  • Expand/Collapse: You can expand or collapse the data as needed.

To view the statistics at WAN Link level, navigate to Reports > Statistics > WAN Links tab.

Wan link

You can view the following metrics:

  • WAN Link Name: The path name.
  • Bandwidth Upload: Upload (LAN > WAN) Bandwidth usage for the selected time period.
  • Bulk Bandwidth Upload: Upload (LAN > WAN) virtual path bandwidth used by Bulk traffic for the selected time period.
  • Control Bandwidth Upload: Upload (LAN > WAN) virtual path bandwidth used by Control traffic for the selected time period.
  • Control Packet Upload: Upload (LAN > WAN) Virtual Path Control packets for the selected time period.
  • Interactive Bandwidth Upload: Upload (LAN > WAN) virtual path bandwidth used by Interactive traffic for the selected time period.
  • Max Bandwidth Upload: Maximum upload (LAN > WAN) bandwidth used in a minute for the selected time period.
  • Min Bandwidth Upload: Minimum upload (LAN > WAN) bandwidth used in a minute for the selected time period.
  • Expand/Collapse: You can expand or collapse the data as needed.

Interfaces

The Interfaces statistic report helps you during troubleshooting to quickly see whether any of the ports are down. You can also view the transmitted and received bandwidth, or packet details at each port. You can also view the number of errors that occurred on these interfaces during a certain time period.

To view Interface statistics, navigate to Reports > Statistics > Interfaces tab.

You can view the following metrics:

  • Interface Name: The name of the Ethernet interface.
  • Tx Bandwidth: Bandwidth transmitted.
  • Rx Bandwidth: Bandwidth received.
  • Errors: Number of errors observed during the selected time period.
  • Expand/Collapse: You can expand or collapse the data as needed.

Classes

The virtual services can be assigned to particular QoS classes, and different bandwidth restraints can be applied to different classes.

To view Class statistics, navigate to Reports > Statistics > Classes tab.

Classes

You can view the following metrics:

  • QoS Class: The class name.
  • Bandwidth: Transmitted bandwidth.
  • Data Volume: Data sent, in Kbps.
  • Drop Volume: Percentage of data dropped.
  • Drop Percent: Percentage of data dropped.
  • Expand/Collapse: You can expand or collapse the data as needed.

Services

To view the Services statistics, navigate to Reports > Statistics > Services tab.

Select the service type from the list. The options are as follows:

  • Passthrough – This service manages traffic that is not intercepted, delayed, shaped, or changed by the SD-WAN. Traffic directed to the Passthrough Service includes broadcasts, ARPs, and other non-IPv4 traffic, and traffic on the Virtual WAN Appliance local subnet, configured subnets, or Rules applied by the Network Administrator. This traffic is not delayed, shaped, or changed by the SD-WAN. Therefore, you must ensure that Passthrough traffic does not consume substantial resources on the WAN links that the SD-WAN Appliance is configured to use for other services.

  • Intranet – This service manages Enterprise Intranet traffic that has not been defined for transmission across a Virtual Path. As with Internet traffic, it remains unencapsulated, and the SD-WAN manages bandwidth by rate-limiting this traffic relative to other service types during times of congestion. Under certain conditions, and if configured for Intranet Fallback on the Virtual Path, traffic that ordinarily travels with a Virtual Path can instead be treated as Intranet traffic, to maintain network reliability.

  • Internet – This service manages traffic between an Enterprise site and sites on the public Internet. Traffic of this type is not encapsulated. During times of congestion, the SD-WAN actively manages bandwidth by rate-limiting Internet traffic relative to the Virtual Path, and Intranet traffic according to the SD-WAN configuration established by the Administrator.

Services

You can view the following metrics:

  • Site Name: The site name.
  • Bandwidth Upload: Upload (LAN > WAN) Bandwidth usage for the selected time period.
  • Packets Upload: Upload (LAN > WAN) Packets sent for the selected time interval.
  • Packets Dropped Upload: Number of upload packets dropped.
  • Drop Percentage Upload: Percentage of upload data dropped.
  • Expand/Collapse: You can expand or collapse the data as needed.

GRE tunnels

You can use a tunneling mechanism to transport packets of one protocol within another protocol. The protocol that carries the other protocol is called the transport protocol, and the carried protocol is called the passenger protocol. Generic Routing Encapsulation (GRE) is a tunneling mechanism that uses IP as the transport protocol and can carry many different passenger protocols.

The tunnel source address and destination address are used to identify the two endpoints of the virtual point-to-point links in the tunnel. For more information about configuring GRE tunnels on Citrix SD-WAN appliances, see GRE Tunnel.

To view GRE Tunnel statistics, navigate to Reports > Statistics > GRE Tunnels tab.

You can view the following metrics:

  • Site Name: The site name.
  • Tx Bandwidth: Bandwidth transmitted.
  • Rx Bandwidth: Bandwidth received.
  • Packet Dropped: Number of packets dropped, because of network congestion.
  • Packets Fragmented: Number of packets fragmented. Packets are fragmented to create smaller packets that can pass through a link with an MTU that is smaller than the original datagram. The fragments are reassembled by the receiving host.
  • Expand/Collapse: You can expand or collapse the data as needed.

IPsec tunnels

IP Security (IPsec) protocols provide security services such as encrypting sensitive data, authentication, protection against replay, and data confidentiality for IP packets. Encapsulating Security Payload (ESP), and Authentication Header (AH) are the two IPsec security protocols used to provide these security services.

In IPsec tunnel mode, the entire original IP packet is protected by IPsec. The original IP packet is wrapped and encrypted, and a new IP header is added before transmitting the packet through the VPN tunnel. For more information about configuring IPsec tunnels on Citrix SD-WAN appliances, see IPsec Tunnel Termination.

To view IPsec Tunnel statistics, navigate to Reporting > statistics > IPsec Tunnels tab.

You can view the following metrics:

  • Tunnel Name: The tunnel name.
  • Tunnel State: IPsec tunnel state.
  • MTU: Maximum transmission unit—size of the largest IP datagram that can be transferred through a specific link.
  • Packet Received: Number of packets received.
  • Packets Sent: Number of packets Sent.
  • Packet Dropped: Number of packets dropped, because of network congestion.
  • Bytes Dropped: Number of bytes dropped.
  • Expand/Collapse: You can expand or collapse the data as needed.

Real time statistics

You can also get the following real time statistics information under Reports > Real time > Statistics:

  • Address Resolution Protocol (ARP)
  • Routes
  • Virtual Path Services
  • Classes
  • Ethernet
  • Observed Protocols
  • WAN Path
  • Application QoS
  • Other Statistics (Rules, Rule Applications, Applications, Site, Multicast Group, IPsec Tunnel, GRE Tunnel, WAN Link Usage, Intranet, Access Interfaces, WAN Links, NDP, Rule Groups, and MPLS Queues)

Real time stats

Address Resolution Protocol

To view ARP statistics, navigate to Reports > Real Time > ARP tab.

Click Retrieve latest data to get the current data.

ARP

Routes

To view Route statistics, navigate to Reports > Real Time > Routes tab.

Routes

Virtual Path Services

To view virtual path service statistics, navigate to Reports > Real Time > Virtual Path Services tab.

Virtual path services

Classes

To view Class statistics, navigate to Reports > Real Time > Classes tab.

Classes

Ethernet

To view Ethernet statistics, navigate to Reports > Real Time > Ethernet tab.

Ethernet

Observed Protocols

To view observed protocol statistics, navigate to Reports > Real Time > Observed Protocols tab.

Observed protocols

WAN Path

To view WAN path statistics, navigate to Reports > Real Time > WAN Path tab.

WAN path

Application QoS

To view application QoS statistics, navigate to Reports > Real Time > Application QoS tab.

Application QoS

You can select other statistics as needed from the drop-down list and view the statistics.

Multicast Group

To view multicast group statistics, navigate to Reports > Real Time > Statistics > Multicast Group.

You can select other statistics as needed from the drop-down list and view the statistics.

NDP

The NDP real-time report provides statistical information about the Neighbor Discovery Protocol (NDP) configurations.

To view the NDP report, navigate to Reports > Real Time > Statistics > NDP. Click Retrieve latest data to get the current data.

NDP

MPLS Queues

MPLS queues allow you to define the queues corresponding to the Service Provider MPLS queues, on the MPLS WAN Links. For information on configuring MPLS queues, see MPLS Queues.

To view MPLS Queue statistics, at the site level, navigate to Reports > Real Time > Statistics. Click Other Stats, select MPLS Queues, and click Retrieve latest data. The latest MPLS queues data is retrieved from the appliance and is displayed in the Citrix SD-WAN Orchestrator service.

You can view the direction, no of packets, delta packets, and mismatched DSCP packets for Intranet and Virtual path services.

MPLS Queues

For private MPLS Queues, you can view the following details:

  • Private MPLS: The private MPLS WAN link.
  • MPLS Queue: The MPLS queue associated with the MPLS WAN link.
  • Access Interface: The access interface associated with the MPLS queue.
  • IP Address: The IP address associated with the MPLS queue.
  • Proxy Address: The proxy IP address associated with the MPLS queue.
  • Proxy ARP State: The state of proxy address resolution protocol. Enabled, disabled, or N/A
  • MAC: The MAC address of the interface associated with the MPLS queue.
  • Last ARP Reply age: Time in milliseconds when the last ARP reply was received.

For more details on troubleshooting, see Troubleshooting MPLS queues.

Flows

The Flows feature provides unidirectional flow information related to a particular session going through the appliance. This provides information on the destination service type the flow is falling into and also the information related to the rule and class type and also the transmission mode.

The table columns are customizable. Click Customize Columns at the right top corner of the table and select/deselect the options that you want to display or hide in the table.

Flows

Firewall connections

The Firewall connections provide the state of the connection related to a particular session based on the firewall action configured. Firewall connections also provide complete details about the source and destination of the connection.

Firewall connections

Routing Protocols

The Routing Protocols report provides the details of the parameters associated with the routing protocols. Choose a protocol from the View drop-down list and a routing domain from the Routing Domain drop-down list. Click Retrieve Latest Data to view the current data.

You can view the parameter details associated with the following:

  • BGP State
  • OSPF State
  • OSPF Topology
  • OSPF Interface
  • OSPF LSADB
  • OSPF Neighbors
  • Route Table

Routing protocol reports

DHCP Server and Relay

The DHCP Server/Relay report provides the information on the interfaces configured as DHCP Server or Relay and its associated routing domain and status. You can search for the required DHCP server or relay information using the Key: Value format.

Real-time DHCP reports

If the mode is Server, you can click Show Clients and view the list of DHCP clients associated with the DHCP server.

Real-time DHCP report status

Click Clear Clients to remove the DHCP clients that are currently associated with the DHCP server.

Real-time DHCP clear clients

Click Restart to restart the DHCP Server or Relay.

Real-time DHCP report restart

IGMP

When the multicast receivers initiate a join group request, you can see the receiver details under Reports > Real Time > IGMP > IGMP Stats. You can see this information at both the source and the destination. Click Refresh to get the current data.

The following image shows the IGMP packets received and the filter type RECV is used to include IGMP receive packets.

IGMP

To view the details of IGMP proxy groups, navigate to Reports > Real Time > IGMP > IGMP Proxy Groups. Click Refresh to get the current data.

IGMP

Select Purge IGMP Stats to purge IGMP statistical data from the IGMP stats table.

Select Purge IGMP Group to purge IGMP group data from the IGMP groups table.

VRRP

The VRRP real-time report provides details about the configured VRRP groups. To view Virtual Router Redundancy Protocol (VRRP) report, navigate to Reports > Real Time > VRRP. Click Retrieve Latest Data to get the current data.

VRRP

PPPoE

The PPPoE report provides status information of the configured virtual interface with the PPPoE static or dynamic client mode. It allows you to manually start or stop the sessions for troubleshooting purposes.

  • Virtual interface: The virtual interface associated with PPPoE.
  • IP Address: The IP address associated with the virtual interface. If the virtual interface is up and ready, displays the recently received values. If the virtual interface is stopped or is in failed state, displays the last received values.
  • Gateway IP: The IP address associated with the Gateway. If the virtual interface is up and ready, displays the recently received values. If the virtual interface is stopped or is in failed state, displays the last received values.
  • Session ID: The unique identifier associated with PPPoE session.
  • State: The State column displays the status of the PPPoE session using three color codes; green, red, yellow. The following table describes the states and descriptions.
PPPoE session type Status Color Description
Configured Yellow A VNI is configured with PPPoE. This is an initial state.
Dialing Yellow After a VNI is configured, the PPPoE session state moves to dialing state by starting the PPPoE discovery. Packet information is captured.
Session Yellow VNI is moved from Discovery state to Session state, waiting to receive IP, if dynamic or waiting for acknowledgment from server for the advertised IP, if static.
Ready Green IP packets are received and VNI and associated WAN link is ready for use.
Failed Red PPP/PPPoE session is terminated. The reason for the failure can be due to invalid configuration or fatal error. The session attempts to reconnect after 30 seconds.
Stopped Yellow PPP/PPPoE session is manually stopped.
Terminating Yellow An intermediate state terminating due to a reason. This state automatically starts after certain duration (5 seconds for normal error or 30 secs for a fatal error).
Disabled Yellow The SD-WAN service is disabled.

PPPoE reports

DNS statistics

The DNS Statistics provides the information on the application name, DNS service name, DNS service status, and the amount of hits to the DNS service. The information for DNS proxy and DNS transparent forwarder is displayed on two different tabs.

Proxy statistics

DNS proxy statistics

Transparent forwarder statistics

DNS transparent forwarder statistics

IPsec

The IPsec real-time report provides details about the IPsec tunnel settings on your network.

To view details of IPsec Security Associations (IPsec SAs), navigate to Reports > Real Time > IPsec > IPsec SAs. Click Retrieve latest data to get the current data.

To view details of Internet Key Exchange Security Associations (IKE SAs), navigate to Reports > Real Time > IPsec > IKE SAs. Click Retrieve latest data to get the current data.

You can also purge the IPsec group data and statistical data by selecting Purge IPsec Group and Purge IKE Stats respectively.

IPsec

Cloud Direct

The Cloud Direct report provides more granular details about the usage (bandwidth utilization, latency, and packet loss) for each of the participating WAN link and major historical events of the site.

Cloud Direct report1

Cloud Direct report2

O365 Metrics

Citrix SD-WAN allows you to not only perform beacon probing, but also determines the latency to reach Office 365 endpoints through each WAN link. The latency is the round trip time taken to send a request and get a response from the Office 365 beacon service over a WAN link. This enables network administrators to view the beacon service latency report and manually choose the best internet link for direct Office 365 breakout. Beacon probing is enabled only through the Citrix SD-WAN Orchestrator service. By default, beacon probing is enabled on all Internet enabled WAN links when Office 365 break-out is enabled through the Citrix SD-WAN Orchestrator service.

Office 365 Metrics

Appliance reports (Preview)

Appliance reports deliver the network traffic and system usage reports. Using this data you can troubleshoot network issues or analyze the behavior of your Citrix SD-WAN devices. You can see the following tabs under Appliance Reports page:

  • Interface
  • LACP LAG Groups
  • Network
  • CPU Usage
  • Disk Usage
  • Memory Usage
  • LTE Signal

Click each tab to view or monitor the appliance graph by hour, day, weekly, and monthly. You can toggle between Absolute and Relative time as required. The table columns are customizable. Click Customize Columns at the right top corner of the table and select/deselect the options that you want to display or hide in the table.

Customize Column

Interface

The Interface page shows the management interface errors/traffic. All the network is divided into different interface, such as Management Interface, Interface 1/2/3.

Appliance report interface

  • Interface Name – Displays the interface name.
  • Bytes Sent – Average number of bytes sent for the selected duration in Kbps.
  • Bytes Received – Average number of bytes received for the selected duration in Kbps.
  • Packets Sent – Number of packets sent for the selected duration.
  • Packets Received – Number of packets received for the selected duration.
  • Error Count Sent – Number of errors count sent for the selected duration.
  • Error Count Received – Number of errors count received for the selected duration.
  • Actions – You can switch on the action button to view the network graph.

LACP LAG Groups

The LACP LAG Groups page shows the details of the interfaces that are configured with LAG and LACP.

LACP LAG Groups

  • Site name: Name of the site.
  • LAG name: Name given for LAG.
  • Interface name: The interface that is configured for LAG.
  • Selection: The interface selection status.
  • State: The following flags are displayed to communicate the LACP status between the site that you are using and its connected site:
    • ACT: Refers to active. Indicates that LACP is in active mode.
    • Inactive: Indicates that LACP is in inactive mode.
    • TIMEOUT: Refers to time out. Indicates that the device is requesting a fast (1 s) transmit interval with the site that it is connected with. When the TIMEOUT flag is not displayed, it indicates that a slow (30s) transmit interval is requested.
    • AGG: Refers to aggregation. Indicates that the port is configured for aggregation (typically always set).
    • SYNC: Refers to synchronization. When SYNC is displayed, it indicates that the device is ready to use this link in the bundle to carry traffic. When SYNC is not displayed, it indicates that the link is not usable or is in standby mode.
    • COL: Refers to collection. Indicates that the traffic received on this interface will be processed by the device.
    • DIST: Refers to distribution. Indicates that the device is using this link to transmit the traffic.
    • EXP: Refers to expired. Indicates that no LACPDUs are received by the device during the past 3 intervals. When EXP is not displayed, it indicates that at least one LACPDU has been received within the past three intervals.
    • DEF: Refers to default. Indicates that no LACPDUs are received during the past 6 intervals. When DEF is not displayed, it indicates that at least one LACPDU is received within the past 6 intervals. Once the default flag is displayed, any stored information of the connected site is removed.
  • System Priority: The priority of the LACP system associated with the site.
  • Port Priority: The priority of the interface configured for LAG.
  • Partner State: The state of the site the LACP system is connected to.
  • Partner System Priority: The priority of the LACP system associated with the connected site.
  • Partner Port Priority: The priority of the interface configured for LAG on the connected site.

Network

The Network page shows the number of TCP connections for each configured site.

Appliance report network

  • Site Name – Displays the site name.
  • Active – Average number of active TCP connection counts for the selected duration.
  • Passive – Average number of passive TCP connection counts for the selected duration.
  • Failed – Average number of failed TCP connection counts for the selected duration.
  • Resets – Average number of reset TCP connection counts for the selected duration.
  • Established – Average number of established TCP connection counts for the selected duration.
  • Actions – You can switch on the action button to view the network graph.

CPU usage

The CPU Usage page shows the CPU utilization of the SD-WAN device as a percentage. The CPU graph shows the average CPU consumption for the regular intervals over the selected time.

Appliance report CPU

  • Site Name – Displays the site name.
  • System – Percentage of total time the CPU spent processing system-space programs.
  • Users – Percentage of total time the CPU spent processing user-space programs.
  • Nice – Nice is when the CPU is running a user task having below-normal priority.
  • Idle – Percentage of total time the CPU was in Idle mode.
  • Io Wait – Percentage of total time the CPU spent waiting for I/O operations.
  • Irq – The interrupt requests (IRQs) value that the kernel serves.
  • Steal - When running in a virtualized environment, the hypervisor might steal cycles that are meant for your CPUs and give them to another, for various reasons. This time is known as steal.
  • Actions – You can switch on the action button to view the network graph.

Disk usage

The Disk Usage page shows the amount of hard disk space used by the operating system and data partition in an I/O per second (IOPS) value.

Appliance report disk

  • Site Name – Displays the site name.
  • Disk Name – Displays the hard disk name.
  • Read IOPS – Displays the average number of read IOPS per second over the selected time frame.
  • Write IOPS – Displays the average number of write IOPS per second over the selected time frame.
  • Latency – Displays the latency value of the successful read and write requests from the selected volume workload over the selected time frame. It is recommended that below 10 ms latency value is best for I/O performance.
  • Read Throughput – Displays the average disk throughput value of the disk read operation over the selected time in Kbps.
  • Write Throughput – Displays the average disk throughput value of the disk write operation over the selected time in Kbps.
  • Disk Utilization – Displays the average disk utilization value in percentage over the selected time frame.
  • Actions – You can switch on the action button to view the network graph.

Memory usage

The Memory Usage page shows the report of the amount of memory used.

Appliance report memory

  • Site Name – Displays the site name.
  • Apps – Displays the used application value in Gb.
  • Swap Cache – Displays the swap cache number in Mb. Swap cache is a list of page table entries with one entry per physical page.
  • Slab Cache – Displays the number of pre-allocated slabs of memory. In Mb
  • Shmem – Displays the total used shared memory value in Mb.
  • Cache – Displays the number of cache memories used in Gb.
  • Buffers – Displays the number of the physical memory that is used by the buffer cache.
  • Unused – Displays the number of unused memories for cache.
  • Swap – Displays the number of swap spaces. The swap space is used if you need some space extension for your physical memory.
  • Actions – You can switch on the action button to view the network graph.

LTE signal

The LTE Signal page shows the signal strength of internal and external LTE modems.

Signal strength is measured in decibels (dB) and the values are classified as follows:

  • Excellent: >-65 dB
  • Good: -65 dB to -75 dB
  • Fair: -75 dB to –85 dB
  • Poor: < -85 dB

NOTE

The LTE Signal page is available only for Citrix SD-WAN 110 and 210 appliances.

LTE signal strength

  • Site Name: Displays the site name.
  • Internal Modem Signal Strength: Displays the strength of the LTE signal on the internal modem.
  • External Modem Signal Strength: Displays the strength of the LTE signal on the external modem.
  • Actions: You can switch on the action button to view the network graph.

WAN link metering reports provide details about the metered WAN link usage. You can view the reports to get insights into the data consumption of the metered WAN links. To view WAN link metering reports, navigate to Reports > WAN Link Metering.

WAN link metering