The Clients page includes the following features:
- A Summary graph displaying network bandwidth usage and how it has fluctuated over a given time span.
- The list of connected clients.
- A Search function for clients by MAC address, operating system, device type or NetBIOS/Bonjour name. (For details, see the Search tool section below)
- Zoom control, which enables the administrator to see only those clients that have been connected within the specified time span. You can adjust the time span by clicking on 2 hours, day, week, or month.
- A customizable client device list with a variety of available information columns. Sort columns by clicking on a column header. Add or remove columns by clicking Columns and shifting options in or out of the Displayed columns window.
- Mouse over a row in the device list to see a new line appear in the usage graph. This line depicts the fraction of total bandwidth that the highlighted device used.
- Export list data in XML format for further processing and analysis outside of the Dashboard. Click Download as XML to retrieve the data. Most spreadsheet programs, such as Microsoft Excel, can open an XML file.
Layer 7 Traffic Analysis
Meraki MS switches are extremely powerful and perform packet inspection at wirespeed. This data is then aggregated and available to you via our intuitive Traffic Analysis interface if enabled.
Enabling Traffic Analysis
Enabling Traffic Analysis is very simple and can be done by navigating to Network-wide > General and select Traffic Analysis Enabled from the Traffic Analysis menu.
Using Traffic Analysis
Traffic analysis can help you analyze how your switch(es) are being utilized in your network. L7 visibility allows you to see all traffic on your L2 network, which provides unprecedented insight to help you make intelligent data driven decisions.
Below is an example of how to use this powerful tool to your advantage:
Example - Using Traffic Analysis for QoS and Efficiency
You can very easily determine if a specific application, for example DropBox, is contributing to a large amount of your switch network's overall usage:
- View Application Analysis data by scrolling to "Applications" on the pie chart and then choosing "More".
- From the list, locate the application of interest and select it (in this example DropBox).
- From this view, you can see each contributing client and the Rule usage, Portion of rule (in %) and more detail as well as a link to each client.
This level of detail on a per-application basis can allow for a network administrator to then implement QoS or traffic shaping policies to either prioritize or reduce the application's usage on the network.
You can click on a particular device in the client device list to obtain additional information about the device. This page provides detailed information about the client device and user as well as the device's network usage.
The top of the page contains device status information, including client configuration details, MAC address, IP address, hostname, manufacturer, operating system, port forwarding, one-to-one IP addresses, event log, and the device to which it is connected.
You can edit the device configuration by clicking Edit details on the Clients details page. You can do the following:
- Change the name of the device.
- Add notes that are visible from the main clients list at the Clients page
The Clients and Event log pages under the Monitor tab have search capabilities, enabling you to find or filter a list of client devices. Any search string can be entered, and the Dashboard attempts to match that search string across all available fields. For example, you can search or filter by device description, Ethernet address, IP address, user, MAC address, and so on. In addition, searches can be bookmarked for future use.
The search tool also supports a number of keywords that can be used to search or filter by specific characteristics. All of the available keyword options are enumerated under the Helplink next to the search tool.
The search tool operates over the data in the database pertaining to all the devices in a given network. This is an effective way to manage and monitor a large number of client devices.