WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies
Viewing Information About Firebox StatusViewing Information About Firebox StatusThere are four tabs that tell about Firebox® status and configuration: Status Report, AuthenticationList, Blocked Sites, and Security Services.Status ReportThe Status Report tab gives you statistics about Firebox traffic and performance.The Firebox Status Report contains this information:Uptime and version informationThe Firebox uptime, the WatchGuard® Firebox System software version, the Firebox model, andappliance software version. There is also a list of the status and version of the productcomponents on the Firebox.Log ServersThe IP addresses of all configured Log Servers.Logging optionsLog message options that are configured with the Quick Setup Wizard or Policy Manager.Memory and load averageStatistics on the memory use (shown in bytes of memory) and load average of the Firebox.The load average has three values that typically show an average over the last minute, 5minutes, and 15 minutes. Values over 1.00 (100%) indicate some threads are queued untilresources are available. (A system load that exceeds 1.00 does not mean the system isoverloaded.)48 WatchGuard System Manager
Viewing Information About Firebox StatusProcessesThe process ID, the name of the process, and the status of the process.Network configurationInformation about the network cards in the Firebox: the interface name, its hardware andsoftware addresses, and its netmask. The display also includes local routing information and IPaliases.Blocked Sites listThe current manually blocked sites and any current exceptions. Temporarily blocked site entriesappear on the permanent Blocked Sites tab.InterfacesEach Firebox interface appears in this section, along with information about the type ofinterface it is configured as (external, trusted, or optional), its status and packet count.RoutesThe Firebox kernel routing table. You use these routes to find which Firebox interface is used foreach destination address.Dynamic routes that have been accepted by the dynamic routing daemon appear here as well.ARP tableThe ARP table on the Firebox. The ARP table is used to match IP addresses to hardwareaddresses. (When an appliance is in drop-in mode, use the contents of the ARP table only totroubleshoot connectivity over secondary networks on the interfaces.)Dynamic RoutingThis shows dynamic routing components are in use on the Firebox, if any.Refresh intervalThis is the rate at which this display updates the information.SupportClick Support to open the Support Logs dialog box. This is where you set the location to whichyou save the diagnostic log file. You save a support log in tarzipped (*.tgz) format. You createthis file for troubleshooting, when asked by your support representative.Authentication ListThe Authentication List tab of Firebox System Manager gives information about all the persons thatare authenticated to the Firebox. There are four columns to show you information about each authenticateduser:UserThe name the user gives when they authenticate.TypeThe type of user who authenticated: Firewall, MUVPN, or PPTP.IP AddressThe internal IP address being used by the user. For MUVPN and PPTP users, the IP addressshown here is the IP address assigned to them by the Firebox.User Guide 49
- Page 16 and 17: MSSQL-Monitor .....................
- Page 18 and 19: xviiiWatchGuard System Manager
- Page 20 and 21: Fireware Features and ToolsYour org
- Page 22 and 23: WatchGuard System Manager (WSM) Use
- Page 24 and 25: WatchGuard System Manager (WSM) Use
- Page 26 and 27: WatchGuard System Manager (WSM) Use
- Page 28 and 29: Installing WatchGuard System Manage
- Page 30 and 31: Installing WatchGuard System Manage
- Page 32 and 33: Quick Setup Wizardtion, you must ha
- Page 34 and 35: Putting the Firebox into Operation
- Page 36 and 37: Starting WatchGuard System ManagerT
- Page 38 and 39: Upgrading to a New Version of Firew
- Page 40 and 41: Installation Topics• High Availab
- Page 42 and 43: LiveSecurity Service Broadcastslear
- Page 44 and 45: WatchGuard Users ForumAdvanced FAQs
- Page 46 and 47: Product Documentation• Netscape N
- Page 48 and 49: Training and Certification30 WatchG
- Page 50 and 51: Firebox System Manager Menus and To
- Page 52 and 53: Seeing Basic Firebox and Network St
- Page 54 and 55: Seeing Basic Firebox and Network St
- Page 56 and 57: Monitoring Firebox TrafficMonitorin
- Page 58 and 59: Clearing the ARP CacheLearning more
- Page 60 and 61: Using the Performance Console2 From
- Page 62 and 63: Using the Performance ConsoleWorkin
- Page 64 and 65: Viewing Number of Connections by Po
- Page 68 and 69: Viewing Information About Firebox S
- Page 70 and 71: Viewing Information About Firebox S
- Page 72 and 73: Using HostWatchWhile the top part o
- Page 74 and 75: Using HostWatchPausing the HostWatc
- Page 76 and 77: Working with Licenses3 Below Option
- Page 78 and 79: Working with Licenses2 Expand Licen
- Page 80 and 81: Setting a Friendly Name and Time Zo
- Page 82 and 83: Changing the Firebox Passphrases10
- Page 84 and 85: Recovering a FireboxTo manually res
- Page 86 and 87: Recovering a Firebox68 WatchGuard S
- Page 88 and 89: Opening a Configuration Fileto a se
- Page 90 and 91: About Firebox Backup ImagesSaving a
- Page 92 and 93: Working with AliasesAlias names are
- Page 94 and 95: Using Global SettingsEnable TOS for
- Page 96 and 97: Managing a Firebox from a Remote Lo
- Page 98 and 99: Managing a Firebox from a Remote Lo
- Page 100 and 101: Setting Up the Log ServerSetting Up
- Page 102 and 103: Setting up the Firebox for a Design
- Page 104 and 105: Setting Global Logging and Notifica
- Page 106 and 107: Setting Global Logging and Notifica
- Page 108 and 109: Types of Log MessagesTypes of Log M
- Page 110 and 111: LogViewer SettingsLogViewer Setting
- Page 112 and 113: Using LogViewerSearching in LogView
- Page 114 and 115: Using LogViewerTo convert a log fil
Viewing Information About Firebox StatusProcessesThe process ID, the name of the process, and the status of the process.Network configurationInformation about the network cards in the Firebox: the interface name, its hardware andsoftware addresses, and its netmask. The display also includes local routing information and IPaliases.Blocked Sites listThe current manually blocked sites and any current exceptions. Temporarily blocked site entriesappear on the permanent Blocked Sites tab.InterfacesEach Firebox interface appears in this section, along with information about the type ofinterface it is configured as (external, trusted, or optional), its status and packet count.RoutesThe Firebox kernel routing table. You use these routes to find which Firebox interface is used foreach destination address.Dynamic routes that have been accepted by the dynamic routing daemon appear here as well.ARP tableThe ARP table on the Firebox. The ARP table is used to match IP addresses to hardwareaddresses. (When an appliance is in drop-in mode, use the contents of the ARP table only totroubleshoot connectivity over secondary networks on the interfaces.)Dynamic RoutingThis shows dynamic routing components are in use on the Firebox, if any.Refresh intervalThis is the rate at which this display updates the information.SupportClick Support to open the Support Logs dialog box. This is where you set the location to whichyou save the diagnostic log file. You save a support log in tarzipped (*.tgz) format. You createthis file for troubleshooting, when asked by your support representative.Authentication ListThe Authentication List tab of Firebox System Manager gives information about all the persons thatare authenticated to the Firebox. There are four columns to show you information about each authenticateduser:<strong>User</strong>The name the user gives when they authenticate.TypeThe type of user who authenticated: Firewall, MUVPN, or PPTP.IP AddressThe internal IP address being used by the user. For MUVPN and PPTP users, the IP addressshown here is the IP address assigned to them by the Firebox.<strong>User</strong> <strong>Guide</strong> 49