9
ProSecure Unified Threat Management (UTM) Appliance
Use QoS and Bandwidth Assignments to Shift the Traffic Mix. . . . . . .396
Monitoring Tools for Traffic Management. . . . . . . . . . . . . . . . . . . . . . .396
System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397
Change Passwords and Administrator and Guest Settings . . . . . . . . .397
Configure Remote Management Access . . . . . . . . . . . . . . . . . . . . . . .399
Use a Simple Network Management Protocol Manager. . . . . . . . . . . .401
Manage the Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .403
Update the Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
Update the Scan Signatures and Scan Engine Firmware . . . . . . . . . .410
Configure Date and Time Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . .412
Connect to a ReadyNAS and Configure Quarantine
Settings (UTM9S Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414
Log Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414
Connect to a ReadyNAS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415
Configure the Quarantine Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .416
Chapter 11 Monitoring System Access and Performance
Enable the WAN Traffic Meter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419
Configure Logging, Alerts, and Event Notifications . . . . . . . . . . . . . . . . .422
Configure the Email Notification Server . . . . . . . . . . . . . . . . . . . . . . . .422
Configure and Activate System, Email, and Syslog Logs. . . . . . . . . . .423
How to Send Syslogs over a VPN Tunnel between Sites. . . . . . . . . . .427
Configure and Activate Update Failure and Attack Alerts. . . . . . . . . . .429
Configure and Activate Firewall Logs. . . . . . . . . . . . . . . . . . . . . . . . . .432
Monitor Real-Time Traffic, Security, and Statistics. . . . . . . . . . . . . . . . . .433
View Status Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439
View the System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439
View the Active VPN Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .451
View the VPN Tunnel Connection Status. . . . . . . . . . . . . . . . . . . . . . .452
View the PPTP and L2TP Server Status (UTM9S Only) . . . . . . . . . . .453
View the Port Triggering Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .454
View the WAN Ports Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .456
View Attached Devices and the DHCP Log . . . . . . . . . . . . . . . . . . . . .457
Query the Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .460
Query and Download Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461
Example: Use the Logs to Identify Infected Clients . . . . . . . . . . . . . . .466
Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466
Query the Quarantine Logs (UTM9S Only) . . . . . . . . . . . . . . . . . . . . . . .467
Query the Quarantined Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467
View and Manage the Quarantined Spam Table . . . . . . . . . . . . . . . . .470
View and Manage the Quarantined Infected Files Table . . . . . . . . . . .471
Spam Reports for End Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472
View, Schedule, and Generate Reports. . . . . . . . . . . . . . . . . . . . . . . . . .473
Report Filtering Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .474
Use Report Templates and View Reports Onscreen . . . . . . . . . . . . . .476
Schedule, Email, and Manage Reports . . . . . . . . . . . . . . . . . . . . . . . .480
Use Diagnostics Utilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .482
Use the Network Diagnostic Tools