Im User Monitor List - Fortinet FortiGate Series Administration Manual

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

User

IM user monitor list

FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
Figure 422: Firewall user monitor list
Refresh
Current Page
Refresh
Refresh the Firewall user monitor list.
Current Page
The current page number of list items that are displayed. Select the left and
right arrows to display the first, previous, next or last page of logged in users.
Column Settings
Customize the table view. You can select the columns to hide or display and
specify the column displaying order in the table. For more information, see
"Using column settings to control the columns displayed" on page 103
"Web-based manager icons" on page
Clear All Filters
Remove all filters applied to the Firewall user monitor list.
De-authenticate All
Stop authenticated sessions for all users in the Firewall user monitor list.
User(s) must re-authenticate with the firewall to resume their communication
Users
session.
Filter icons
Edit the column filters to filter or sort the firewall user monitor list according to
the criteria you specify. For more information, see
manager lists" on page
User Name
The user names of all connected remote users.
User Group
The user group that the remote user is part of.
Duration
Length of time since the user was authenticated.
Time-left
Length of time remaining until the user session times out. Only available if the
authentication time of the session will be automatically extended
(authentication keepalive is enabled). If authentication keepalive is not
enabled, the value in Time-left will be N/A. For more information, see the
FortiGate CLI
IP Address
The user's source IP address.
Traffic Volume
The amount of traffic through the FortiGate unit generated by the user.
Method
Authentication method used for the user by the FortiGate unit (authentication
methods can be FSAE, firewall authentication, or NTLM).
User lists can be managed to allow or block certain users. Each user can be assigned a
policy to allow or block activity for each IM protocol. Each IM function can be individually
allowed or blocked providing the administrator the granularity to block the more bandwidth
consuming features such as voice chat while still allowing text messaging. The IM user
monitor list displays information about instant messaging users who are currently
connected. The list can be filtered by protocol. After IM users connect through the firewall,
the FortiGate unit displays which users are connected. You can analyze the list and
decide which users to allow or block.
To view the list of active IM users, go to User > Monitor > IM.
105.
99.
Reference.
Monitor
Stop individual
authentication session
and
"Adding filters to web-based
677

Advertisement

Table of Contents
loading

Table of Contents