Quick Reference Guide

Table Of Contents
150 | Chapter 9: Monitoring System Performance
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Note: Both incoming and outgoing traffic are included in the limit
Increase this month limit by. Temporarily increase the traffic limit if you have
reached the monthly limit, but need to continue accessing the Internet. Select the
checkbox and enter the desired increase. (The checkbox will automatically be cleared
when saved so that the increase is only applied once.)
This month limit. Displays the limit for the current month.
3. In the Traffic Counter section, make your traffic counter selections:
Restart Traffic Counter Now. Select this option and click Apply to restart the traffic
counter immediately.
Restart Traffic Counter at a Specific Time. Restart the traffic counter at a specific
time and day of the month. Fill in the time fields and choose AM or PM and the day of
the month from the drop-down lists.
Send e-mail report before restarting counter. An e-mail report will be sent
immediately before restarting the counter. You must configure the e-mail capability in
order for this function to work (see “Activating Notification of Events and Alerts” on
page 150).
4. In the When limit is reached section, make the following choice:
Block all traffic. All access to and from the Internet will be blocked.
Block all traffic except E-mail. Only e-mail traffic will be allowed. All other traffic will
be blocked.
Send E-mail alert. You must configure the e-mail capability in order for this function
to work (see “Activating Notification of Events and Alerts” on page 150).
5. Click Apply to save your settings.
To configure the traffic meter for the WAN2 port, click the WAN2 Traffic Meter tab and repeat
this process
The Internet Traffic Statistics section displays statistics on Internet traffic via the WAN port.
If you have not enabled the Traffic Meter, these statistics are not available.
Click the Traffic by Protocol link, in the upper right header, to see a report of the Internet
traffic by type. The volume of traffic for each protocol will be displayed in a popup window.
Traffic counters are updated in MBytes scale; the counter starts only when traffic passed is at
least 1MB.
Activating Notification of Events and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your network
storage will log security-related events such as: accepted and dropped packets on different
segments of your LAN; denied incoming and outgoing service requests; hacker probes and