Analyzing the Rule Base Hit Count

The Hit Count feature shows the number of connections that match each ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session.. Hit Count is supported in the Access Control, NAT and HTTPS InspectionClosed Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. Rule Bases.

The Hit Count data lets you:

  • Identify and remove unused rules (rules with zero hits).

    Note - A rule with a zero hits means there are no matching connections on Security Gateways with Hit Count enabled. There can still be matching connections on Security Gateways with Hit Count disabled.

  • Analyze and better understand policy behavior.

Hit Count operates independently of logging and tracks hits even if the Track option is set to None.

Note - Hit Count is supported for the Access Control, NAT, and HTTPS Inspection policies. For HTTPS Inspection, Hit Count is supported from R82.10 Security Gateways and above.

Enabling or Disabling Hit Count

Hit Count is enabled by default for all supported Security Gateways. The data collection time frame is also configured globally. You can disable Hit Count for specific Security Gateways if needed.

After you enable or disable Hit Count, install the policy on the applicable Security Gateways for the changes to take effect.

Hit Count Display

To show the Hit Count in the Rule Base:

Right-click the heading row of the Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase. and select Hits.