Skip to main content

Illumio Core 23.2 Visualization User Guide

Traffic Table

The Traffic table in the visualization tools displays search results in a traditional table format. You can use the Traffic table in the following ways:

About the Traffic Table

Using the Traffic table, you can query the PCE's traffic database to analyze traffic flows for auditing, reporting, and troubleshooting. You can search for traffic flows between workloads or hosts, labeled workloads, or IP addresses, and you can restrict the search by specific port numbers and protocols.

The VEN decorates the flow summary logs with DNS names when it sends them to the PCE. In the Traffic table, the PCE appends the DNS names to the flow logs so that auditors and SOC analysts can look at these DNS names instead of performing reverse look-ups on random IP addresses.

When you want to search for traffic flows on a regular basis, you can save that filter and it appears under your Saved filters in the Load Filter drop-down list. You can save up to 100 filters. You can make changes to an existing Saved filter and save the modified query. The Traffic table also displays your ten most recent searches.

Searches

When you search data in the Traffic table, you are searching traffic flows between sources and destinations over a specific time period over a specific port and protocol. A search consists of the following elements:

  • Destination: Enter workloads, IP addresses, or labels that are consuming the service provided in the traffic flow. The entries you add in the filter that includes the data are used as a search criteria and the ones you add in the a field that excludes data are not used in the search.

  • Source: Enter workloads, IP addresses, or labels that are providing the service in the traffic flow. The entries that you add to include the data are used as a search criteria and the ones you add to exclude the data not used in the search.

    Note

    You can choose to search either “Destination And Source” or “Destination Or Source” by selecting the option from the More menu.

  • Services: Enter port and protocol, port ranges, process, Windows services, or policy services. Enter port numbers and protocol types to search for traffic flows whose destination port values and protocols match the search criteria. The entries you add to include in the search are used as a search criteria and the ones you add to exclude data are not used in the search. If you do not specify a value, all ports, protocols, port ranges, processes, and services are included in the search.

  • Time: Select how far in the past (last hour, day, week, month, or anytime) or specify a custom time range. The custom time filter displays all the flows between the selected from-to date-time stamp.

  • Reported Policy Decision: Select the type of policy decision to search for flows with a specific policy decision reported by the VEN.

    new-ui-reported-policy-decision-dropdown.png

    See Deny Rules and the Traffic Table in this topic for more information.

  • Exclude Workloads from IP List Query: (Available in the More drop-down menu.) This setting applies to queries that contain an IP list in the Consumer or Provider fields. It specifies whether known managed and unmanaged workloads are excluded from the query results. When selected (the default setting), managed and unmanaged workloads are excluded from query results when their IP addresses are within the range of one of the IP lists in the query. When this option is not selected, workloads are not excluded from the query results.

    explorer-more-exclude-wkloads-IP-list.png
Export Query Results

In the Table view, click Export to gather your data in a. CSV file for the results from the current query.

To export results from previous queries, click Load Results to display queries from the past 24 hours. Click the Export button in the Action column for the results you want to save as a CSV file.

The exported CSV file uses a separate column for each label type, and the column data is alphabetized.

If you are an Illumio Core customer who has upgraded to 22.5.0 and are using Illumination Plus, be aware that the format of exported CSV files has changed from previous releases of Illumination Classic. You should update any scripts that you used for processing these CSV files.

View by Connections with Common Labels

In the Traffic view, you can view aggregated results of the Destination and Source labels for traffic flows or view all traffic flows for a query.

To choose the type of view you want, select the option from the Connections with common labels drop-down menu (New UI):

new-ui-connections-common-labels.png

Label-Set Connections drop-down menu (Classic UI):

illumination_plus_connections_view_menu.png

Important

The Classic UI uses the terminology "Label-Set Connections" for this feature.

Using this feature, you can see a more concise view of your traffic flows.

Important

This setting is important because to write rules from the Traffic table, you must be viewing the Traffic table using the Connections with common labels option. The Allow Selected Connections button in the Traffic table is disabled until you choose this setting.

The view for Connections with common labels displays the Draft rules based on the label queries; whereas the view for Connections displays the workload-to-workload rules, which can take longer to display the list but can be more accurate. Toggling back to the Connections with common labels option after displaying the individual connections does not reload the page so that the page displays quickly.

View Policy Details from the Traffic Table

The Traffic table includes a Policy Decision column (either Reported or Draft depending on the view selected), which indicates whether traffic flows are allowed, blocked, or potentially blocked based on your policy.

When you see traffic flows that are potentially blocked, it could mean that you haven't created rules for those flows or you have rules written for the flows, but the provider workload enforcement is set to Visibility Only for those flows.

Clicking a link for Allowed traffic opens the View Policy dialog box. When applicable, the dialog box displays in separate tabs all your policy, including Deny Rules, rules, and Essential Service rules that apply to the selected traffic flow

Deny Rules and the Traffic Table

Note

In the Classic UI, Deny Rules are still referred to as Enforcement Boundaries.

Deny Rules are displayed in Draft and Reported views of the Traffic table. When you view your traffic flows in the table, you see whether traffic is blocked by a Deny Rule or allowed through a Deny Rule. Viewing this information is useful to determine where Deny Rules are in place and understand their impact before provisioning them.

Tip

To view the details about a Deny Rule, click the linked text for traffic allowed across the rule (“Allowed”) or blocked by a Deny Rule (“Blocked”) while in a Draft view of the Traffic table. The View Policy dialog box opens. Then, click the Deny Rules tab.

You can obtain the following information:

  • A Deny Rule is blocking a traffic flow.

  • Traffic is potentially blocked by a Deny Rule.

    A Deny Rule is in place, but the workload is still in visibility-only mode. The traffic won't be blocked by the rule until you move it into selective enforcement mode.

  • A Deny Rule is in place, but an allow rule is allowing traffic through the Deny Rule.

Resolve Unknown FQDNs
  1. Click Resolve Unknown FQDNs to export FQDN information for unknown IP Addresses and Done from the confirmation dialog box.

    glob-exp-resolve-unknown-fqdns-dialog.png
  2. Click Export. This button appears next to Resolve Unknown FQDNs.

    Note

    Clear cached FQDN values and reload the results if you do not find relevant information.

    Depending on the number of draft rules, the data might be slow to load. Once it loads, columns called Draft Policy Decision and Reported Policy Decision will be populated with data and will appear in the exported zip file.