Unified Analytics for
Context-Rich Insights

Track network health (bandwidth, latency, packet loss) and device health (CPU, memory—temperature coming soon). Correlate it with security signals like logins, credential misuse, and lateral movement. Get cross-system, context-rich insights in minutes, not timelines stitched together across different portals.

SD-WAN Analytics

01

Data Logging Framework

Highly scalable, reliable, optimized, policy-driven data logging framework for all services

Highly scalable, reliable, optimized, policy-driven data logging framework for all services

Highly scalable, reliable, optimized, policy-driven data logging framework for all services

Multiple transports

Multiple transports

Multiple transports

Servers

Servers

Servers

Streaming of logs to one or more 3rd party collectors

Streaming of logs to one or more 3rd party collectors

Streaming of logs to one or more 3rd party collectors

02

Reports & Analytics

Real & historical time series log event reporting for various SD-WAN functions

Real & historical time series log event reporting for various SD-WAN functions

Real & historical time series log event reporting for various SD-WAN functions

Traffic usage/protocol anomaly detection through trend lines and confidence band

Traffic usage/protocol anomaly detection through trend lines and confidence band

Traffic usage/protocol anomaly detection through trend lines and confidence band

Prediction-based on extrapolation of trending data

Prediction-based on extrapolation of trending data

Prediction-based on extrapolation of trending data

Ad-hoc and scheduled reports

Ad-hoc and scheduled reports

Ad-hoc and scheduled reports

Predefined and custom report templates

Predefined and custom report templates

Predefined and custom report templates

Report export formats: csv, pdf, xls, email notification

Report export formats: csv, pdf, xls, email notification

Report export formats: csv, pdf, xls, email notification

03

Security Reports

Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection

Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection

Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection

Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput

Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput

Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput

Web traffic reports: top web traffic by URL categories and reputation

Web traffic reports: top web traffic by URL categories and reputation

Web traffic reports: top web traffic by URL categories and reputation

Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.

Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.

Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.

Forensics: packet capture for known/unknown applications and detected vulnerabilities

Forensics: packet capture for known/unknown applications and detected vulnerabilities

Forensics: packet capture for known/unknown applications and detected vulnerabilities

04

Search

Multi-column search with drilldown

Multi-column search with drilldown

Multi-column search with drilldown

Generic and custom queries

Generic and custom queries

Generic and custom queries

Correlation searches

Correlation searches

Correlation searches

05

Anomalies

Support of anomaly detection in traffic pattern/usage

Support of anomaly detection in traffic pattern/usage

Support of anomaly detection in traffic pattern/usage

Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)

Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)

Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)

06

GUI

Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)

Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)

Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)

Visualization using charts, real-time views, maps, grids

Visualization using charts, real-time views, maps, grids

Visualization using charts, real-time views, maps, grids

Drilldown support to analyze data instantly for a given time range, detect trends and anomalies

Drilldown support to analyze data instantly for a given time range, detect trends and anomalies

Drilldown support to analyze data instantly for a given time range, detect trends and anomalies

Automatic data enrichment

Automatic data enrichment

Automatic data enrichment

Flexible reporting framework

Flexible reporting framework

Flexible reporting framework

07

Network Reports

Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit

Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit

Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit

Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites

Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites

Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites

CGNAT reports: NAT events, pool utilization etc.

CGNAT reports: NAT events, pool utilization etc.

CGNAT reports: NAT events, pool utilization etc.

08

Management

Role-based access control + Command|API Access

Role-based access control + Command|API Access

Role-based access control + Command|API Access

Historical log archival and cleanup

Historical log archival and cleanup

Historical log archival and cleanup

Learn How CommandLink Can Empower Your Business

Learn How CommandLink Can Empower Your Business

Learn How CommandLink Can Empower Your Business