Security Dashboard


The Security Dashboard displays various security-related data gathered by the Crystal Eye XDR from the network and the endpoint clients. The information is depicted through widgets making it convenient for Crystal Eye XDR administrators to have a 360 degree view of all the security aspects related to the CE XDR network. The powerful features of the security dashboard have the capability to display an array of security-related data that could play a vital role in averting a major cyber-attack on a real-time basis.

One of the most convenient features of the security dashboard is that it can be customised as per specific monitoring requirements. The CE XDR administrator has the option to design the layout of the security dashboard and choose which widget to be displayed.

By default, the CE XDR displays six important security dashboard widgets namely, the IP Attack Map, Scan Summary, IDPS Alerts Statistics, Top IPs (that have downloaded and uploaded data the most), Network Map (hub and spoke widget), Top Protocols Graph (in terms of traffic size). Each part named above provides a snippet of security related data and is also linked with the relevant Crystal Eye XDR application from where it draws network security related data.

In addition to this, there are other security widget’s that the CE XDR administrator can choose to display in the security dashboard. The widgets that are not displayed in the security dashboard and can be explicitly selected to be a part of it are, Antivirus Database Updates, IDPS Events, AI Analysis Timelines, Top Users, Top Device Types, Top External IPs, Top Traffic Classification, Uptime and RAID Summary.


The IP Attack Map section of the Security Dashboard portrays unmatched capabilities in providing a base view of all attacks originating from various IP addresses targeted towards Crystal Eye XDR networks.

There are six major security related indicators that are displayed in the IP attack map section of the CE Security Dashboard:

Crystal-eye-xdr-4.0-ip-attack-map-new


Crystal Eye XDR has an in-built defensive system called ‘Forcefield’ that bans IP addresses in case the authentication failure threshold is surpassed. The Banned IPs table shows the time and date on which the IP address was banned providing deeper insights of possible failed breaches. Crystal Eye XDR administrators can whitelist the banned IP addresses as well.

The following screenshot shows the Banned IPs Table:

crystal-eye-xdr-banned-ip-table

Note: The Banned IPs Table can also be viewed in the IP Attack Map application. The banned IPs can also be allowed (whitelisted) from this application. A PDF report showing pie charts of the number of IP addresses banned and unbanned can also be obtained under the Banned IPs Logs Report section of the Forcefield application. The pie chart also shows the top 10 countries from where the IP addresses were banned.

How to Allow/Whitelist an IP Address Banned by Crystal Eye XDR’s Forcefield?

Step 1: In the Security Dashboard, click the Allow button next to the IP address that needs to be whitelisted in the Banned IPs Table.

crystal-eye-banned-ip-address-whitlisting-forcefield

Note: You will also notice that the banned IP address is erased from the Banned IP Logs Reports in the Forcefield application.


This part of the IP attack map provides specific inputs on the different types of attacks targeted towards Crystal Eye XDR networks. These attacks are derived Intrusion Detection and Prevention System (IDPS) Alerts. The strings of attacks as shown in the screenshot below are colour coded to specify different protocols used to execute the attacks.

crystal-eye-xdr-real-time-attack-tracker

Note: The Real Time Attack Tracker can also be viewed in the IP Attack Map application. The banned IPs can also be allowed (whitelisted) from the IP Attack Map application of the Crystal Eye XDR.

Some of the attack protocols that are detected and displayed here are FTP, SSH, TELNET, EMAIL, WHOIS, DNS, HTTP, HTTPS, SQL, SNMP, SMB, AUTH, RDP, DoS, and ICMP. If the attack protocols are different from the ones mentioned above then it would be recorded under ‘others’.

Each IDPS alert denoted in the world map has a corresponding effect on the Alert table. This table shows the date/time the attack was initiated, the source IP, destination IP, country (from where the attack originated), region name, description of the attack, severity etc.


The traffic size or the size of the data transferred using a particular protocol is detected by the Crystal Eye XDR and is measured in megabytes and is displayed here in the Protocol Traffic Size Indicator table. The standard unit of measurement used to measure the Protocol Traffic Size is Megabytes (MB).

crystal-eye-xdr-protocol-traffic-size-indicator

Note: The Protocol Traffic Size Indicator table can also be viewed in the IP Attack Map application.


This table shows the device name (as mapped with the CE XDR) and the amount of data that it had received and sent over a period. The Device Traffic Size is measured in Megabytes (MB).

crystal-eye-xdr-device-traffic-size-indicator

Note: The Device Traffic Size table can also be viewed in the IP Attack Map application.


This Alert Report displays attack specific data also known as IDPS alerts generated on a real-time basis. These attacks and the protocols involved are visually depicted in the Real Time Attack Tracker mentioned above. When an attack is initiated, the origin of the attack and the target CE XDR network is visually depicted in the Real Time Attack Tracker. The Crystal Eye XDR administrator can also view elaborated details of the attack such as the source IP, destination IP, country (from where the attack originated), region name, description of the attack, severity etc in the Alert Report.

crystal-eye-xdr-idps-alert-report

The above screenshot depicts that there was an attack that originated from Pakistan and was targeted towards a network secured with Crystal Eye in Western Australia. The attack is denoted in the map and its corresponding details are also mentioned in the Alert Report.

Upon clicking a particular IDPS alert the Crystal Eye XDR administrator can view alert details, escalate an attack alert to Red Piranha’s SOC team, and view the IDPS rules that triggered the alert.

Note: The IDPS Alerts Report can also be viewed in the IP Attack Map application and the Threat Dashboard.

What is Alert Analysis? What are the various ways IDPS alerts can be analysed?

The Crystal Eye XDR displays various real-time alerts that can be viewed and analysed. The analysis process includes viewing the IDPS Alerts and the rules that are triggering these alerts. The real-time alert pops-up in the alerts report and is triggered by rules which can be converted to pass, drop, or reject. If a rule is triggering too many false positives then the Crystal Eye XDR administrator can also disable those rules. As a part of an elaborated alert analysis mechanism the CE XDR administrator also has the leverage to escalate an alert attack to Red Piranha’s security operations centre (SOC) team.

We have discussed the various ways to analyse IDPS alerts below (refer to the ‘how tos’ below):

  • How to view IDPS alert details and the rules that triggers the IDPS alerts?
  • How to convert the IDPS rules to Drop, Pass or Alert after it triggers an attack alert?
  • How to disable a particular IDPS rule that triggers an IDPS alert?
  • How to escalate an attack alert to Red Piranha’s security operations centre team for analysis?

How to view IDPS alert details and the rules that triggers the IDPS alerts?

Step 1: In the Security Dashboard, click any of the IDPS alerts in the Alert Report section.

crystal-eye-xdr-view-reports-alerts1

Step 2: You will now see a detailed report of the IDPS alert details and the IDPS rule details that triggered the alert.

crystal-eye-xdr-view-reports-alerts2

How to select an appropriate action for the selected ruleset?

The IDPS rule plays a vital role in alerting and blocking detected anomalies in the Crystal Eye XDR network. The characteristics of these specially crafted rules can be changed as per required.

These rules can be converted to Alert, Pass, and Reject further defining the nature of the rules as discussed below.

Alert: After the action for the selected ruleset is set as ‘Alert’, the data packet will be detected, and an alert will be generated for the same.

Pass: After conversion of the rule action to Pass, if a signature matches, the packets are allowed by this rule and continue to be processed by subsequent rules in order.

Reject: Post conversion of the rule to Reject, if a signature matches then the packet will not go through, and both the sender and receiver will receive a reject packet.

Step 1: In the Security Dashboard, click an IDPS alert in the Alert Report.

crystal-eye-xdr-ruleset-action-idps-report1

Step 2: You will now see a detailed report of the IDPS alert details and the IDPS rule details that triggered the alert.

crystal-eye-xdr-ruleset-action-idps-report2

Step 3: Click the Change Rules Actions button in the IDPS alert details pop-up.

crystal-eye-xdr-ruleset-action-idps-report3

Step 4: You will now see the Change Rule Actions pop-up. Select Alert, Pass or Reject from the default_ruleset dropdown and click the Update button. crystal-eye-xdr-ruleset-action-idps-report4

Note: If there is a requirement to dig in deeper to further analyse the IDPS Alerts in detail then this can be done by hitting the Threat Hunting button. You will then be directed to the IDPS Threat Hunting section of the Threat Dashboard.

crystal-eye-xdr-ruleset-action-idps-report5

How to disable a particular IDPS rule that triggered an alert?

The Crystal Eye XDR administrator might come across situations when the IDPS rule that triggered the alert must be disabled. In this case, the IDPS alert must be clicked and then the Disable Rule button must be clicked.

Step 1: In the Security Dashboard page, click the IDPS alert for which the IDPS rule needs to be disabled.

crystal-eye-xdr-disable-idps-rule-security-dashboard1

Step 2: You will now see the Alert Details and the Rule Details. Read the details and then click the Disable button.

crystal-eye-xdr-disable-idps-rule-security-dashboard2

How to escalate an attack alert from the Security Dashboard to Red Piranha’s security operations centre (SOC) team for analysis?

All attack alerts can be escalated to Red Piranha’s Security Operations Centre (SOC) Team after the Incident Response Services application is installed.

Note: Escalations will not be processed until the Incident Response Services application is installed and configured.

The details of the alerts that are escalated are also mentioned in the Escalated Alerts section under the IDPS Threat Hunting tab of the Threat Dashboard. A PDF report of the Escalated Alerts can also be generated from the escalated alerts section.

Click here to know how to configure Incident Response Services application.

Note: If the Incident Response Services application is not installed and configured then the following error message will be displayed.

Step 1: In the Security Dashboard page, click the IDPS alert that needs to be escalated.

crystal-eye-xdr-attack-escalation1

Note: Before you initiate the process of alert escalation to Red Piranha’s SOC team make sure that the Incident Response Services application is installed and configured. Click here to know how to configure the Incident Response Services application.

Step 2: You will now see the Alert Details and the Rule Details. Read the details and then click the Escalate button.

crystal-eye-xdr-attack-escalation2

Step 3: You will now see a Comment Box. Add the comment and click the Submit button.

crystal-eye-xdr-attack-escalation3


The Crystal Eye XDR has an inbuilt Gateway Antivirus that examines and evaluates files as they transit in real time. The CE XDR makes use of a combination of signature and heuristic analysis to classify files to detect and automatically block malicious files in order to prevent infection from occurring. The Gateway Scan Summary section of the Security Dashboard displays the scan summary specifying details regarding the files that were blocked. These details include Timestamp, IP Address (where the malicious files were detected), Site (domain name from where the malicious files originated), Blocked URL (URL of the blocked file), Reason (why the file was blocked), Content Type and Description.

Note: The Gateway Scan Summary can also be viewed in the Scan Summary section of the Gateway Scan Report application and the AV Alerts Summary section under the IDPS Alerts tab of the Threat Dashboard. You can also download a PDF Scan Summary Report from the Gateway Scan Report application.

Crystal Eye XDR administrators can also filter the scan report for a particular time bucket. All the flagged bad content in the Gateway Scan Summary are searchable through the search bar. The files that are blocked can also be allowed (whitelisted) to get past Crystal Eye’s AV and can also be escalated to Red Piranha’s Security Operations Team (RP Secops) for further analysis. The escalation process can only be done if the Incident Response Services application is installed and configured.

How to Filter Scan Report as per Time Range?

Step 1: In the Security Dashboard, select the Time Range from the dropdown.

crystal-eye-xdr-filter-gateway-scan-report1

Step 2: You will now see the Scan summary for the selected time range.

crystal-eye-xdr-filter-gateway-scan-repor2

Note: Here we have selected the time range as ‘past 1 hour’ so that the scan summary shows all the files that were blocked in the past 1 hour.

How to Allow a Flagged Bad Content from the Gateway Scan Summary in the Security Dashboard?

Step 1: In the Security Dashboard, click the flagged bad content in the Gateway Scan Summary section.

crystal-eye-xdr-allow-flagged-content-gateway-scan1

Step 2: You will now see the Scan Information pop-up. Click the Allow button.

crystal-eye-xdr-filter-gateway-scan-repor2

Step 3: You will now see the message, “Successfully Allowed Site’’.

Note: Once the flagged bad content is allowed the website from where the file was downloaded gets included in the Exception Sites section of the Content Filter application. However, the inclusion of the website would remain limited to the exception sites section of the content filter policy assigned to the IP address where the bad content was detected at the first place.

How to Escalate the ‘Flagged Bad Content’ Displayed in the Gateway Scan Summary to Red Piranha’s Security Operations Centre (SOC) Team?

Before escalating the ‘flagged bad content’ to Red Piranha’s SOC Team it must be ensured that the Incident Response Services application is installed from the marketplace and configured as well. Apart from the Security Dashboard, a ‘flagged bad content’ can also be escalated from the Scan Summary section of the Gateway Scan Report application and the AV Alerts Summary section under the IDPS Alerts tab of the Threat Dashboard.

Step 1: In the Security Dashboard, click the flagged bad content displayed in the Gateway Scan Summary.

crystal-eye-xdr-escalate-flagged-content-gateway-scan1

Step 2: You will now see the Scan Information pop-up. Click the Escalate button.

crystal-eye-xdr-escalate-flagged-content-gateway-scan2

Note: You will now see the message, “Alert Escalated Successfully”.


The IDPS Alerts Statistics widget is a graphical representation showing the total number of IDPS related alerts, netflow events, DNS requests, SSH connections and top alerts rule SID triggered on a particular day at a particular time. The data can be adjusted and can be displayed according to the desired time period which can be selected from the dropdown.

The 6 types of graphs that can be displayed in this widget are related to Alert, Flow, DNS, SSH and Top Alerts Rule SID. These graphs can also be viewed in the Reports section under the IDPS Alerts tab of the Threat Dashboard.

How to view different graph types related to Alert, Flow, DNS, SSH and Top Alerts Rule SID?

There are two dropdowns in the top panel of the IDS/IPS alerts statistics widget which can be used to control the data displayed here. Using the first dropdown (refer to the screenshot below) the CE administrator can select the required data type to display corresponding information in the graph related to Alert, Flow, DNS, SSH and Top Alerts Rule SID.

crystal-eye-xdr-idps-alerts-statistics1

The second dropdown can be used to select a time range to further filter the report. This helps in segregating data and analysing alert information belonging to a particular time range.

crystal-eye-xdr-idps-alerts-statistics2

How to Interpret the Graphical Data Related to Alert in the IDPS Alerts Statistics Widget?

Step 1: In the IDPS Alerts Statistics widget, select Alert from the first dropdown in the top panel.

crystal-eye-xdr-idps-alerts-statistics-graphical-data1

Step 2: You will now see the Alerts graph. The y-axis shows the number of alerts and the x-axis shows the time.

crystal-eye-xdr-idps-alerts-statistics-graphical-data2

Note: Point the cursor to the graph points (as mentioned in the screenshot below) and you will see a pop-up showing the number of alerts recorded at that particular date and time.

crystal-eye-xdr-idps-alerts-statistics-graphical-data3

How to Interpret Graphical Data Related to Flow Count in the IDPS Alerts Statistics Widget?

Step 1: In the IDPS Alerts Statistics widget, select Flow from the first dropdown in the top panel.

crystal-eye-xdr-flow-count-idps-alerts-statistics1

Step 2: You will now see the Flow graph. The y-axis shows the number of flow counts and the x-axis shows the time.

crystal-eye-xdr-view-reports-alerts2

Note: Point the cursor to the graph points (as mentioned in the screenshot below) and you will see a pop-up showing the number of Netflow counts recorded by the Crystal Eye appliance at a particular date and time.

How to interpret graphical data related to the number of DNS requests recorded by the Crystal Eye XDR?

Step 1: In the IDPS Alerts Statistics widget, select DNS from the first dropdown in the top panel.

crystal-eye-xdr-dns-requests-idps-alerts-statistics1

Step 2: You will now see the DNS requests graph. The y-axis shows the number of DNS requests and the x-axis shows the time.

crystal-eye-xdr-dns-requests-idps-alerts-statistics2

Note: Point the cursor to the graph points (as mentioned in the screenshot below) and you will see a pop-up showing the number of DNS requests recorded by the Crystal Eye XDR at that particular date and time.

How to interpret graphical data related to SSH connections recorded by the Crystal Eye XDR?

Step 1: In the IDPS Alerts Statistics widget, select SSH from the first dropdown in the top panel.

crystal-eye-xdr-ssh-connections-idps-alerts-statistics1

Step 2: You will now see the SSH graph. The y-axis shows the number of SSH connections and the x-axis shows the time.

crystal-eye-xdr-ssh-connections-idps-alerts-statistics2

Note: Point the cursor to the graph points (as mentioned in the screenshot below) and you will see a pop-up showing the number of SSH connections recorded by the Crystal Eye appliance at a particular date and time.

crystal-eye-xdr-ssh-connections-idps-alerts-statistics3

How to view Alert, Netflow Count, DNS Requests, and SSH Connections on a single graph?

Step 1: In the IDPS Alerts Statistics widget, select Alert, Flow, DNS & SSH from the first dropdown in the top panel.

crystal-eye-xdr-Alert-Netflow-DNS-SSH-Connections1

Step 2: You will now see the combined graph of Alert, Flow, DNS and SSH. The y-axis shows the Alerts, Netflow count, DNS requests and SSH a connection recorded by the CE appliance and the x-axis shows the time.

crystal-eye-xdr-Alert-Netflow-DNS-SSH-Connections2

How to view the Top Alerts Rule SID graph in the IDPS Alerts Statistics widget?

Step 1: In the IDPS Alerts Statistics page, select Top Alerts Rule SID from the first dropdown.

crystal-eye-top-alert-rule-idps-alerts1

Step 2: You will now see the Top Alerts Rule SID graph. The y-axis shows the number of times an SID rule was triggered and the x-axis shows the Signature Identification Number (SID).

crystal-eye-top-alert-rule-idps-alerts2

Note: In the screenshot above, SID number 2029340 on the x-axis of the graph shows that it was triggered over 300 times in the past 24 hours.

How to fetch in-depth information about the IDPS Alerts from Crystal Eye’s Security Dashboard?

Step 1: In the Security Dashboard, click the link icon in the top-right corner of the IDPS Alerts widget.

crystal-eye-xdr-detailed-idps-alerts-report1

Note: You will now be directed to the IDPS Alerts tab of the Thread Dashboard. Here you will gain access to in-depth information about Alerts, Escalated Alerts, Events, AV Alerts, Escalated AV Alerts, Alerts Report, Netflow Report, DNS Report, and SSH Report. The CE XDR administrator also has the leverage to export and send a Summary report to any email address. The report can also be scheduled to be delivered to an email address on a daily, weekly and monthly basis or can be sent instantly as well. All these reports can be filtered according to a particular time range.


The Top IPs widget displays a graph that depicts the download size and uploads size of data transferred to and from devices connected to the Crystal Eye XDR network.

Note: The information related to the download size and uploads size of data transferred to and from devices connected to the Crystal Eye XDR network is also available in the Device Traffic Size Indicator section of the IP Attack Map (both in the Security Dashboard and the IP Attack Map application). You can also view this information in the Top network IPs section under the Network Threat Hunting tab of the Threat Dashboard.

How to interpret the data mentioned in the Top IPs widget of the Security Dashboard?

The Top IPs widget in the security dashboard shows top devices connected to the CE network in terms of the amount of data transferred and received by them.

crystal-eye-xdr-top-ip-widget-security-dashboard

In the above graph, the information related to the data transferred and received have been segregated and displayed in a bar graph format (the green bar shows the download size and the red bar shows the upload size).

How to view in-depth network report covering various aspects related to monitoring data transfer size and number of data packets transferred in the Crystal Eye XDR network?

Step 1: In the Top IPs widget of the Security Dashboard, click the link icon on the top-right side of the widget.

crystal-eye-xdr-top-ip-detailed-report

Note: You will now be directed to the Network Activity section of the Network Threat Hunting tab of the Threat Dashboard. Here you will be able to view reports related to the packets downloaded and uploaded, and size of the data downloaded and uploaded on a particular device in the CE network. You can also view the data size transferred to and received from external IP addresses.


The Network Map widget shows a diagrammatic presentation of the device types and the devices connected to the Crystal Eye XDR Network. Visual depiction of the Crystal Eye XDR network is done through a hub and spoke diagram where the hub is the Crystal Eye XDR (network gateway) and the spokes are the device types connected to the Crystal Eye XDR network.

crystal-eye-xdr-network-map

In the above screenshot of the Network Map widget, you would observe that there are 3 Laptops connected to the Crystal Eye network. The total number of devices connected to the Crystal Eye network is shown in Crystal Eye gateway.

The Network Map widget has multiple functionalities built into it that facilitates device mapping and assigning content filter policy to the device. Mapping devices to the Crystal Eye network includes assigning username, nickname, vendor, IP address, and the device type.

Note: As a matter of convenience, you can map devices and assign content filter policies from the Network Map application alternatively. To go to Network Map application from the Security Dashboard, click the link icon in the top panel of the Network Map widget (Refer to the screenshot below).

crystal-eye-xdr-network-map-security-dashboard

How to identify various devices and view its IP address in the Network Map widget?

Step 1: In the Security Dashboard, click the device type category on the hub and spoke diagram under the Network Map widget. In the screenshot below, we will click the device type Laptop.

crystal-eye-xdr-identify-devices-network-map

Note: Alternatively, you may select the device type Laptop from the dropdown.

crystal-eye-xdr-identify-devices-network-map2

Step 2: You will now see the IP address of all the Laptops connected to the Crystal Eye XDR network.

crystal-eye-xdr-identify-devices-network-map3

Note: In the above screenshot, there are three IP addresses of three laptops connected to the Crystal Eye network.

How to map a device on the Crystal Eye XDR network with the help of the Network Map widget?

Mapping a device on the Crystal Eye XDR network involves assigning a Username, Nickname, Vendor, IP Address, and the Device Type. This can also be done with the help of CE XDR’s Network Map application. Know more about how to map devices on the Crystal Eye network alternatively from the Network Map application.

Note: In the procedure discussed below we will map an unmapped device connected to the Crystal Eye XDR network.

Step 1: In the Security Dashboard, select Unmapped from the dropdown on the top panel of the Network Map widget.

crystal-eye-xdr-network-map-app-device-mapping1

Step 2: You will now see the IP address of all the unmapped devices connected to the Crystal Eye network with a question mark icon next to it.

crystal-eye-xdr-network-map-app-device-mapping2

Step 3: Click the device IP address which requires to be mapped.

crystal-eye-xdr-network-map-app-device-mapping3

Note: In the above screenshot we have clicked 10.10.1.165.

Step 4: You will now see a Select Action pop-up. Click the Edit/Map Device button.

crystal-eye-xdr-network-map-app-device-mapping4

Step 5: You will now be directed to the Map Device pop-up. Assign the Username, Nickname, Vendor (of the device), IP Address, and Device Type and click the Add button.

crystal-eye-xdr-network-map-app-device-mapping5

How to assign a content filter policy to a particular device from the network map widget in the security dashboard?

Note: Apart from the Network Map widget, the content filter policy can also be assigned to a particular device in the Crystal Eye XDR network from the Network Map application and the Content Filter application.

In the steps mentioned below, we have already mapped the laptop device that requires a content filter policy assigned to it.

Step 1: In the Security Dashboard, select any mapped device category. In this case, we will select Laptop from the dropdown in the top panel.

crystal-eye-xdr-assign-filtering-policy-network-map1

Step 2: You will now see the IP address and device name of all the devices connected to the Crystal Eye XDR network.

crystal-eye-xdr-assign-filtering-policy-network-map2

Step 3: Click the device on the Network Map widget for which you wish to assign the content filter policy.

crystal-eye-xdr-assign-filtering-policy-network-map3

Step 4: You will now see the Select Action pop-up. Click the Assign Policy button.

crystal-eye-xdr-assign-filtering-policy-network-map4

Step 5: You will now be directed to the Edit Content Filter Policy pop-up. Select the Policy Type from the dropdown and click the Update button.

crystal-eye-xdr-assign-filtering-policy-network-map5


The Top Protocols widget in the security dashboard summarizes and displays the traffic size related to a particular protocol. Knowing the traffic size handled by a protocol in the Crystal Eye XDR network helps the CE administrator to better understand the traffic and from where it’s originating.

Note: The information related to the traffic size of data transferred is categorized as per protocols used by devices in the CE XDR network. A detailed report covering this aspect can be fetched from the Protocol Detail Report under the Reports section. The CE XDR administrator can also know the device names and the protocols used by these devices. Similarly, the traffic can be further classified using the report data section and all of this can be downloaded in the PDF format.

How to interpret the data in the Top Protocols widget of the Security Dashboard?

The Top Protocols widget shows the traffic size from a particular protocol.

RP7E0D~1

In the above graph, the information related to the traffic size is depicted in the bar graph. These bar graphs are aligned with a particular protocol. The CE XDR administrator can easily know the amount of data packets transferred pertaining to a particular protocol. For instance, in the above screenshot, the traffic size related to SSL VPN protocol is 516905 MB.