User guide
ManageEngine Firewall Analyzer :: User Guide 
69 
Zoho Corp. 
rule, and the Count of log entries that have triggered the paritcular rule. Drill down from 
the rule to see the hosts, protocols, user, status, message, total bytes consumed by the 
rules and count that triggered the firewall rule. The drilled down report also displays the 
total bytes consumed by the rules. 
The Top Unused Rules table shows the Firewall rules that have not triggered. The table 
shows the Rule Number or ID of the unused rule. Drill down from the rule to see the 
description of the unused rule. 
Top Unused ACEs 
In the case of Cisco devices, the table shows the unused ACL and the exact unused 
ACEs. Drill down from the ACL to see the description of the unused ACEs. 
The Top Rules - Protocol Group Based graph shows the top protocol groups that have 
triggered firewall rules. The table below the graph shows the protocol group, the rule 
triggered, and the number of hits. Drill down from this graph to see the top hosts, the 
top protocols and the top conversations that triggered the firewall rule in that protocol 
group. 
The Top Rules - Host Based graph shows the top hosts that have triggered firewall 
rules. The table below the graph shows the host, the rule triggered, the number of hits. 
Drill down from this graph to see the top destinations accessed, the top protocols and 
the top conversations for each host that triggered the firewall rule. 
The Top Rules - Destination Based graph shows the top destinations for which firewall 
rules have been triggered. The table below the graph shows the destination host name 
or IP address, the rule triggered, and the number of hits. Drill down from this graph to 
see the top hosts, the top protocols and the top conversations that triggered the firewall 
rule. 
The Top Rules table shows the overall top firewall rules that have been triggered across 
this firewall. The table below the graph shows the rule triggered, and the number of hits. 
Drill down from this graph to see the top hosts, the top protocols and the top 
conversations that triggered the firewall rule. 










