Monitor
User
FortiGate Version 4.0 Administration Guide
592
01-400-89802-20090424
Figure 394: Firewall user monitor list
IPSEC monitor list
You can use the IPSEC monitor to view activity on IPSec VPN tunnels and start or stop
those tunnels. The display provides a list of addresses, proxy IDs, and timeout information
for all active tunnels, including tunnel mode and route-based (interface mode) tunnels.
You can use filters to control the information displayed in the list. For more information,
see
“Adding filters to web-based manager lists” on page 53
To view active tunnels, go to
User > Monitor > IPSEC
.
Refresh
Refresh the Firewall user monitor list.
Current Page
The current page number of list items that are displayed. Select the left and
right arrows to display the first, previous, next or last page of logged in users.
Column Settings
Customize the table view. You can select the columns to hide or display and
specify the column displaying order in the table. For more information, see
“Using column settings to control the columns displayed” on page 58
and
“Web-based manager icons” on page 60
.
Clear All Filters
Remove all filters applied to the Firewall user monitor list.
De-authenticate All
Users
Stop authenticated sessions for all users in the Firewall user monitor list.
User(s) must re-authenticate with the firewall to resume their communication
session.
Filter icons
Edit the column filters to filter or sort the firewall user monitor list according to
the criteria you specify. For more information, see
User Name
The user names of all connected remote users.
User Group
The user group that the remote user is part of.
Duration
Length of time since the user was authenticated.
Time-left
Length of time remaining until the user session times out. Only available if the
authentication time of the session will be automatically extended
(authentication keepalive is enabled). If authentication keepalive is not
enabled, the value in Time-left will be N/A. For more information, see the
IP Address
The user’s source IP address.
Traffic Volume
The amount of traffic through the FortiGate unit generated by the user.
Method
Authentication method used for the user by the FortiGate unit (authentication
methods can be FSAE, firewall authentication, or NTLM).
Refresh
Stop individual
authentication session
Current Page
Summary of Contents for Gate 60D
Page 705: ...www fortinet com...
Page 706: ...www fortinet com...