566
Field descriptions
Monitors field descriptions
Associated tasks
The task that you can perform with this dialog box is:
■
Table D-3
Active Connection Properties dialog box
Field
Description
Service
Name of the service on which the connection is open.
Source
Host name or IP address of the source of the connection.
For IPsec tunnels, this field is always the local gateway IP address.
Server Source
IP address of the source server.
For IPsec tunnels, this field is always the local gateway address.
Source Address
IP address and port number of the source of the connection.
For IPsec tunnels, this field is always the local gateway address.
Source Interface
Interface name (such as eth0) on client side of a connection.
If the initiating traffic comes from an IPsec tunnel, this field is blank.
Source Tunnel
VPN tunnel from which the connection is initiated.
An IPsec tunnel is often presented in the following format:
[hndl][.type.id]@rem_gw
Where:
hndl = handle
type = protocol type
id = internal tunnel ID
rem_gw = remote gateway
For example, a tunnel presented as [email protected] has the following values:
hndl = 2
type= isakmp
id = 16
rem_gw= 20.20.20.1
Destination
Host name or IP address that the client is connecting to.
For IPsec tunnels, this field is always the remote gateway IP address.
Client Destination
Destination of the connection.
For an IPsec tunnel, this field displays the remote gateway IP address and port number as 0.
Destination Address IP address and port number the client is connecting to.
For IPsec tunnels, this field is always the remote gateway address.
Destination
Interface
Interface name (such as eth1) on the server side of a connection.
If the traffic goes into an IPsec VPN tunnel, this field is blank.
Destination Tunnel
IPsec tunnel that the connection goes to.
To Server
Bytes sent to the server from the security gateway.
From Server
Bytes sent from the server to the security gateway.
To Client
Bytes sent to the client from the security gateway.
From Client
Bytes sent from the client to the security gateway.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...