5.1 DMF Network Tab...........................................................................................................................45
5.2 Policy Statistics Dashboard.............................................................................................................46
5.3 Interface Statistics........................................................................................................................... 47
5.4 SN (Service Node) Statistics...........................................................................................................48
5.5 Events..............................................................................................................................................48
Chapter 6: Monitoring Users and Software Running on the Network......50
6.1 IP Addresses................................................................................................................................... 50
6.1.1 Source and Destination Addresses...................................................................................50
6.1.2 Unauthorized IP Destinations............................................................................................52
6.2 Geographic Location........................................................................................................................53
6.3 Software Running in the Network................................................................................................... 53
6.3.1 Top Talkers Using Well-known Layer-4 Ports...................................................................54
6.3.2 Associating Applications with User-defined Layer-4 Ports................................................ 55
6.3.3 Software Running on Hosts...............................................................................................56
6.3.4 Tools Receiving Traffic......................................................................................................57
6.4 User Activity.....................................................................................................................................60
6.4.1 User Sessions....................................................................................................................60
6.4.2 New Network Users...........................................................................................................62
6.4.3 Unauthorized Intranet Activity............................................................................................63
6.5 Monitoring Active Directory Users...................................................................................................64
Chapter 7: Monitoring Network Performance and Events........................ 65
7.1 Interfaces Sending or Receiving Traffic..........................................................................................65
7.2 Anomalies........................................................................................................................................ 67
7.3 Application Data Management........................................................................................................ 68
7.4 WAN Link Optimization................................................................................................................... 69
7.5 Machine Learning............................................................................................................................71
Chapter 8: Backup and Restore.................................................................. 75
8.1 Elasticsearch Snapshot and Restore..............................................................................................75
8.2 Import and Export of Saved Objects...............................................................................................76
8.2.1 Exporting Saved Objects...................................................................................................76
8.2.2 Importing Saved Objects................................................................................................... 77
8.3 Import and Export of Watchers.......................................................................................................78
8.3.1 Exporting Watchers............................................................................................................79
8.3.2 Importing Watchers............................................................................................................79
8.4 Import and Export of Machine Learning Jobs.................................................................................81
8.4.1 Exporting Machine Learning Jobs.....................................................................................81
8.4.2 Importing Machine Learning Jobs..................................................................................... 82
Chapter 9: Using TACACS+ and RADIUS to Control Access to the
Arista Analytics CLI..................................................................................84
9.1 Using AAA Services with Arista Analytics.......................................................................................84
9.1.1 DMF TACACS+ Configuration...........................................................................................85
9.2 Adding a TACACS+ Server.............................................................................................................86
9.3 Setting up a TACACS+ Server....................................................................................................... 87
9.3.1 Using the Same Credentials for the Analytics Node and Other Devices...........................87
9.3.2 RBAC-based Configuration for Non-default Group User...................................................88
9.4 Using RADIUS for Managing Access to the Arista Analytics Node................................................ 88
9.4.1 Adding a RADIUS Server..................................................................................................89
iv