Diagnostics. Module Objectives By the end of this module participants will be able to: Use diagnostic commands to troubleshoot and monitor performance.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Chapter 9: Access Control Lists
Ver 1,12/09/2012Kode :CIJ 340,Jaringan Komputer Lanjut FASILKOM Routing Protocols and Concepts – Chapter 2 Static Routing CCNA.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 10 Performance Tuning.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
SYSTEM ADMINISTRATION Chapter 19
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Introduction to Network Analysis and Sniffer Pro
Troubleshooting.
Introduction to Fortinet Unified Threat Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 14 Chapter 14: Server Monitoring and Optimization.
1 © 2003, Cisco Systems, Inc. All rights reserved. Documenting Baselining & Troubleshooting Halmstad University Olga Torstensson
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 10: Collect and Analyze Performance Data.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
DASAN NETWORKS GPON Training
Course 301 – Secured Network Deployment and IPSec VPN
Fortinet Single Sign On
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
Course 201 – Administration, Content Inspection and SSL VPN
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Course 201 – Administration, Content Inspection and SSL VPN
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
Course 201 – Administration, Content Inspection and SSL VPN
Basic Router Configuration Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
Packet Tracer 4.1: Novice Session
MCTS Guide to Microsoft Windows 7
Module 5: Isolating Common Connectivity Issues. Overview Determining the Causes of Connectivity Issues Network Utilities That You Can Use to Isolate Connectivity.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Virtual Networking. Module Objectives By the end of this module participants will be able to: Understand the use of virtual LANs Create VLAN subinterfaces.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Sem 2v2 Chapter4: Router Components 4.1. Understand Router Components Understand Router Show Commands Understand Router's Network Neighbors.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Firewall Policies. Module Objectives By the end of this module participants will be able to: Identify the components used in a firewall policy Create.
S7C7 – Multilayer Switching Design and Configuration.
Monitoring and Managing Server Performance. Server Monitoring To become familiar with the server’s performance – typical behavior Prevent problems before.
1 Stevie Award Nomination – “Innovation in Customer Service” Informatica.
Copyright Introduction to Computer Networking Learning About Other Devices.
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
© 2002, Cisco Systems, Inc. All rights reserved..
Application Control. Module Objectives By the end of this module participants will be able to: Define application control lists Define firewall policies.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
Command Line Interface Introduction Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Network Environment Management
FORTINET Network Security NSE8 Dumps - 100% Success
Router Startup and Setup
Kiyoshi Kodama, SE Japan 07-Oct-2008
© 2002, Cisco Systems, Inc. All rights reserved.
Network Environment Management
NSE4-5.4 Dumps PDF Fortinet Network Security Expert 4 Written Exam - FortiOS 5.4 Exam NSE4-5.4 DumpsNSE4-5.4 BraindumpsNSE4-5.4 Dump PDFNSE4-5.4 Exam.
Configuring a Router Module 3 Semester 2.
Routing Protocols and Concepts – Chapter 2
Sem 2v2 Chapter4: Router Components
Router Startup and Setup
Lecture9: Embedded Network Operating System: cisco IOS
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Diagnostics

Module Objectives By the end of this module participants will be able to: Use diagnostic commands to troubleshoot and monitor performance of the FortiGate unit

Diagnostic Commands Tools for troubleshooting and performance monitoring

Diagnostics Commands Commands can be used to debug the operation of the FortiGate unit and to set parameters for displaying different levels of diagnostic information

Normal Operation Commands can be used to establish a baseline of normal operation Determine how system performs in a best case scenario Can be added to a script to be executed at periodic intervals to gather snapshots of overall CPU and memory usage Examples: get system status get system performance status

Resource Usage Commands can be used to check the resource usage of internal processes For example: diag sys top get sys perform top diag sys kill

Proxy Operations Commands can be used to test proxy operations Run these commands in the Global configuration For example: diag test application

Hardware Operations Commands can be used to monitor hardware network operations Errors at the interface are indicative of data link or physical layer issues that may impact the performance of the FortiGate unit For example: diag hardware deviceinfo nic

Memory Utilization The FortiGate antivirus/IPS system operates in one of two modes, depending on the unit’s available shared memory. If the shared memory utilization is below a defined upper threshold the system is in non-conserve mode If the used shared memory goes beyond this threshold the system enters conserve mode These thresholds are non-configurable The threshold above which the system enters conserve mode is 80%, the system will not go back to non-conserve mode until the shared memory usage goes below 70% Commands can be used in the Global configuration to determine to current mode For example: diag hardware sysinfo shm

Memory Utilization If FortiGate unit receives large volumes of traffic on a specific proxy, it is possible that the unit will exceed the connection pool limit Commands can be used on certain FortiGate models to determine the behavior of the FortiGate antivirus system if it becomes overloaded in high traffic and low memory situations For example: config system global set av-failopen {off|one-shot|pass|idledrop}

Traffic Trace Traffic tracing allows a specific packet stream to be followed Commands can be used in specific VDOMs to trace packets For example: diag sys session diag debug flow diag sniffer packet

Session Table An entry is placed in the session table for each traffic session passing through a firewall policy Commands can be used to display specific session table information For example: diag sys session list diag sys session filter diag sys session filter clear

Object Dependencies Configuration objects such as firewall policies may not be deleted if there are other objects that depend on it Command can be used to identify object dependencies For example: diag sys checkused

Flow Trace The flow of packets through the FortiGate unit can be monitored Commands can used to set filters on the traffic and display the data to the console For example: diag debug flow filter diag debug flow show console diag debug flow trace start diag debug flow trace stop

Packet Sniffing The information contained within packets passing through particular interfaces can be monitored Commands can used to set filters on the packets, identify the interfaces to be monitored and set the level of information to display For example: diag sniffer packet

Dealing With Network Processors On FortiGate devices using FA2 and NP2-based interfaces, only the initial session setup will be displayed through the flow commands For troubleshooting purposes, commands can be used to disable NP2 functionality For example: diag npu np2 list diag npu np2 fastpath disable diag npu np2 fastpath-sniffer enable port 1

Debugging Continuous, real-time event information can be displayed for troubleshooting purposes Debug output will continue until explicitly stopped or the FortiGate unit is rebooted System performance may be affected Output may be generated even though it is not displayed in the console Commands can be used to enable, disable and identify the level of information to be displayed For example: diag debug diag debug enable diag debug disable

ARP Tables The ARP table caches the responses to previous ARP requests for MAC address resolution Commands can be used to view and modify the ARP table cache For example: get sys arp diag ip arp list execute clear system arp table diag ip arp delete diag ip arp flush config system arp-table

Date and Time Log entries are timestamped with the current date and time Commands can be used to set the date and time For example: execute time execute date Commands can be used to receive time and date information from an NTP server For example: config system ntp set ntpsync enable/disable

Self Help Options Technical documentation Release Notes Knowledge Center Technical Discussion Forums Fortinet Training Online Campus

Labs Lab - Diagnostics Capturing packets Viewing session tables Proxy-based inspection Click here for step-by-step instructions on completing this lab

Student Resources Click hereClick here to view the list of resources used in this module