463
Monitoring the security gateway
Viewing system health
Monitoring system usage and connections
The System section of the Overall Health window contains charts that show the CPU and memory
usage on the appliance, and connection activity for client VPN and clientless VPN users.
Monitoring these system aspects lets you take action if CPU or memory usage gets too high, or if you
see an unusual number of user connections.
Note:
If the security gateway is not running, the active connection count is zero.
Prerequisites
Complete the following task before beginning this procedure:
■
The appliance must be running.
To monitor system usage and connections
1
In the SGMI, in the left pane, under Monitors, click
Overall Health
.
2
In the right pane, under System, in the Usage chart, view the percentage of CPU usage and memory
usage.
The key to the right of the chart distinguished between CPU and memory usage.
The legend to the right of the chart shows usage percentage. The legend at the bottom of the chart
indicates time.
3
In the Active Connections chart, view the number of active connections.
The key to the right of the chart distinguishes between client VPN connections and clientless VPN
connections.
The legend at the bottom of the chart indicates time. The legend to the left of the chart shows
connections measured by hundreds.
4
To change the active connections that are displayed, do one or more of the following:
Related information
For further information related to this topic, see the following:
■
Monitoring disk usage
The Disk Usage section of the Overall Health window lets you see how much disk space is used.
Monitoring disk usage can help you know when to delete archived log files or clean up unused
configurations.
You can also see whether a disk has failed and take action to avoid loss of data. On Symantec Gateway
Security 5660 appliances and 5640 appliances that have more than one hard disk installed, RAID is
implemented automatically to keep the appliance running in the event of a disk failure. The underlying
mirroring process is totally transparent.
You should also pay attention to log messages that warn you if it is necessary to replace a failed device.
These messages indicate the status of the RAID subsystem, and reflect the severity level of any
problem. Log messages may advise you to take an action, like replacing a drive.
Total
Check to display all connections through the security gateway.
VPN
Check to view connections through the security gateway from Symantec Client VPN
users.
Clientless VPN
Check to view connections through the security gateway from clientless VPN users.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...