Visibility use cases
The NetFoundry console's visibility tools give you real-time and historical insight into your network's behavior. These use cases walk through common scenarios where these tools work together to help you troubleshoot issues, audit activity, and understand how traffic flows through your network.
Security verification
This use case applies to ZTHA (Zero-Trust Host Access) and ZTNA (Zero-Trust Network Access) models, which use an IP/CIDR-based intercept. Traffic analysis gives administrators visibility into broad CIDR intercepts so they can identify what's actually flowing through them and begin breaking that traffic down into granular services and policies.
This use case doesn't apply to ZTAA (Zero-Trust Application Access) models. ZTAA uses an identity- and service-based intercept rather than IP/CIDR ranges, so you already have granular visibility and you know exactly which identity accessed which service. There's no broad intercept to unpack.
To verify that only approved applications are generating traffic:
- Observe traffic patterns in the Traffic Analysis tab.
- Identify the source endpoint.
- Cross-reference with the Network Processes tab to confirm that only approved applications are generating that traffic.