HP X Unified Security Platform Series Manual de usuario Pagina 194

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 333
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 193
Chapter 6 Network
178 X Family LSM User’s Guide V 2.5.1
From the Traffic Capture page, you can:
View and manage existing packet capture files.
To view and manage packet capture files, select Network > Tools > Traffic Capture. Then, select the
Traffic Capture tab.
Create a new traffic capture file. To see a list of packet capture files, go to Network > Tools > Traffic
Capture.
Perform a Traffic Capture
STEP 1
From the LSM, select Network > To o ls . On the Tools page, click the Traffic Capture tab.
STEP 2
On the Traffic Capture page, click Create Capture File.
STEP 3
On the Create Traffic Capture page, specify the Capture File Details:
STEP A
If required, change the settings for the Max File Size (upper limit is 10000000) and
the Max Packets (upper limit is 10000).
STEP B
Select the security Zone Pair on which you want to capture traffic.
STEP 4
Optionally, to further specify which packets to include in the capture, enter IP protocol and
source/destination addresses parameters in the Capture Filter table.
STEP 5
Click Start Capture.
Ping
Use the Ping feature to send Ping requests to test whether devices on an IP network are accessible and
functioning correctly.
Ping can help diagnose connectivity problems such as a failed network device between the device and
the web server being accessed, or to help diagnose DNS setup problems. For example, if the device
cannot access www.mycompany.com, enter www.mycompany.com in the Host IP field and click Start
Ping. If the IP address for the Host appears in the Output table, the DNS server can be contacted and is
working correctly. The problem is therefore a connectivity issue between the device and the original
web server.
Ping a device
STEP 1
From the LSM menu, select Network > To o l s .
STEP 2
On the Tools page, click the Ping tab.
STEP 3
On the Ping page in the Ping Configuration table, type the Host Name or IP address for the
device that you want to ping.
Note Ensure that the policies configured on the device allow the security zone
to send Ping (ICMP) requests. A firewall rule allowing Ping requests between
zones allows the request to be sent to the destination zone and the response to be
allowed back to the source zone.
Vista de pagina 193
1 2 ... 189 190 191 192 193 194 195 196 197 198 199 ... 332 333

Comentarios a estos manuales

Sin comentarios