Skip to end of metadata
Go to start of metadata
You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 13
Next »
Interactive Search
Work Flow
Log in PureInsight
Interactive Search
Check node details
Double-click neighbors to fill out Inline Search criteria
Run Search
Change the graph layout to see the network toptalkers
Slide the “Current Devices Shown” slide
Change Packet Display Limit
Search with Inline Seach: udp
Click the “Result” button to download the output PCAP file
Open the file on Wireshark to do further investigation
Click the “Reports” button to download the node reports CSV
interactive search.mp4
Usage Analysis
Work Flow
Usage Analysis
Change Stream Display Limit
Hover over a host to see the detailed information
Change the stream layout
Click the “Export CSV” button to download the file
From the tooltip, click the “Search” button and the page will direct users to Interactive Search
Inline Search is filled with information
Run the Interactive Search
usage analysis.mp4
Malicious Nodes
Work Flow
Interactive Search
Malicious Nodes have a red blur (Refer to Malicious Nodes )
Change the graph layout to the “List”
Click Malicious node IP Address to see detailed information on the Cisco Talos page
malicious nodes.mp4
PCAP Monitoring
Work Flow
Log in QManager and start capturing network data (Refer to Capture)
Go to the Monitoring dashboard on PureInsight
See the live performance of the packet capture
Save the graph image
pcap monitoring.mp4
VLAN Strip
vlan strip.mp4
VLAN Strip Inner IP Outer ETH
vlan strip inner ip outer eth.mp4