Skip to content

Network Endpoint Insight (NEI)

The NEI subsystem provides a comprehensive overview of all end-devices connected to the network — both currently and historically. It offers a combination of real-time metrics and static information, helping administrators monitor user devices and analyze performance at the edge of the network.

Features and Functionalities

End-Device Real-Time & Static Information

NEI displays key details about each connected device, offering both identification and operational insights.

Information includes:

  • Brand Logo and Name: Automatically detected or assigned for visual identification.

  • MAC Address: Unique hardware identifier of the device.

  • Current IP Address: IP address currently assigned to the device.

  • Historical IP Addresses: List of previously used IPs.

  • Connected Switch and Interface: Indicates where the device is connected in the network topology.

  • 24-Hour Bandwidth Usage: Upload and download bandwidth consumption over the last 24 hours.

  • Live Transfer Speed: Real-time upload and download speed of the device.

End-Device Performance Monitoring

NEI allows for in-depth performance analysis of end-devices using dynamic line charts. These charts offer time-based visualization and allow administrators to hover over specific points in time to inspect metrics.

Monitored metrics include:

  • Bandwidth Consumption Over Time: Historical upload/download usage.

  • Transmission/Reception Errors: Number of errors recorded over time.

  • Packet Loss Over Time: Identifies reliability issues on a per-device basis.

  • Broadcast Packets: Count of broadcasted packets sent/received.

  • Multicast Packets: Count of multicast packets sent/received.

  • Unicast Packets: Count of unicast packets sent/received.

These features help administrators diagnose device-specific problems such as congestion, faulty network cards, or unusual traffic patterns.

Future Enhancements

The NEI subsystem is planned to evolve with advanced tracking and control capabilities, including:

  • Application Visibility: View applications accessed by devices and the time spent on each (requires firewall integration).

  • Bandwidth Usage by Application: Identify the most bandwidth-hungry apps in the network (requires firewall).

  • Operating System Vulnerability Detection: Highlight devices running outdated or insecure operating systems.

  • Browser Detection: Show the web browser used by each device.

  • Device Speed Control: Provide administrators with the ability to throttle upload/download speeds of specific devices.