12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Monitor<br />

VPN IPSEC<br />

Concentrator Name Type a name for the concentrator.<br />

Available Tunnels A list of defined IPSec VPN tunnels. Select a tunnel from the list and<br />

then select the right-pointing arrow. Repeat these steps until all of<br />

the tunnels associated with the spokes are included in the<br />

concentrator.<br />

Members<br />

A list of tunnels that are members of the concentrator. To remove a<br />

tunnel from the concentrator, select the tunnel and select the leftpointing<br />

arrow.<br />

Monitor<br />

You can use the monitor to view activity on IPSec VPN tunnels and start or stop<br />

those tunnels. The display provides a list of addresses, proxy IDs, and timeout<br />

information for all active tunnels, including tunnel mode and route-based (interface<br />

mode) tunnels.<br />

You can use filters control the information displayed in the list. See “Adding filters<br />

to web-based manager lists” on page 43.<br />

To view active tunnels, go to VPN > IPSEC > Monitor.<br />

Figure 231:Monitor list<br />

Type<br />

Clear All Filters<br />

Page controls<br />

Name<br />

Remote Gateway<br />

Remote Port<br />

Proxy ID Source<br />

Select the types of VPN to display: All, Dialup, or Static IP and<br />

Dynamic DNS.<br />

Select to clear any column display filters you might have applied.<br />

Display the first, previous, next or last page of monitored VPNs.<br />

The name of the phase 1 configuration for the VPN.<br />

The public IP address of the remote host device, or if a NAT device<br />

exists in front of the remote host, the public IP address of the NAT<br />

device.<br />

The UDP port of the remote host device, or if a NAT device exists in<br />

front of the remote host, the UDP port of the NAT device. Zero (0)<br />

indicates that any port can be used.<br />

The IP addresses of the hosts, servers, or private networks behind<br />

the <strong>FortiGate</strong> unit. A network range may be displayed if the source<br />

address in the firewall encryption policy was expressed as a range<br />

of IP addresses.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

358 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!