This implementation describes how to set up the Policy Enforcement Manager (PEM) to analyze application traffic on the network, and provide statistics for application visibility. For example, you can view statistics to see what applications are being used. By monitoring your traffic, you can later create enforcement policies that are tailored for your needs.
Policy Enforcement Manager (PEM) gives the BIG-IP system the ability to classify both encrypted and unencrypted traffic into categories for application visibility. You can display statistics about the network traffic in graphical charts, and view classification information by application, category, protocol, virtual server, country, type of device, and so on. In-depth information and application awareness provides visibility into your network infrastructure so you can identify and monitor different types of traffic and resolve performance issues.
Application visibility is particularly useful for service providers. If your organization is using RADIUS protocol for authentication, authorization, and accounting, PEM can intercept accounting messages to retrieve additional information about mobile devices, subscribers, towers, service plans, and manufacturers, for example.
Charts shown on thescreens display the application visibility data. The classification overview is customizable so you can display the exact charts or tables that you need. The overview shows the top statistics for your categories of interest.