- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-Threat logs
- 07-Reputation logs
- 08-URL filtering logs
- 09-File filtering logs
- 10-Data filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-NAT logs
- 15-SSL VPN user access logs
- 16-SSL VPN access resource logs
- 17-Terminal status
- 18-DLP logs
- 19-Zero trust policy logs
- 20-Application audit logs
- 21-System logs
- 22-Configuration logs
- 23-Traffic logs
- 24-Load balancing logs
- 25-TopN traffic
- 26-Security policy hit analysis
- 27-TopN threats
- 28-TopN URL filtering statistics
- 29-TopN file filtering statistics
- 30-Attack defense statistics
- 31-Server load balancing statistics
- 32-Outbound link load balancing statistics
- 33-Transparent DNS proxy statistics
- 34-Connection rate ranking
- 35-DLP statistics
- 36-TopN traffic trends
- 37-Security policy hit trend analysis
- 38-TopN threat trends
- 39-TopN URL filtering trends
- 40-TopN file filtering trends
- 41-Link trend
- 42-Routing policy trends
- 43-Virtual server trend
- 44-Server farm trends
- 45-Real server trend
- 46-Domain Requested Times Trend
- 47-TopN file filtering trends
- 48-Online SSL VPN users trend
- 49-Botnet analysis
- 50-Asset security
- 51-Threat case management
- 52-Report settings
- 53-Session list
- 54-LB session information
- 55-DNS cache information
- 56-User information center
- 57-IPv4 online users
- 58-IPv6 online users
- 59-MAC authentication online users
- 60-Terminal status
- 61-Asset scan
- 62-Ping
- 63-Tracert
- 64-Packet capture
- 65-Webpage Diagnosis
- 66-Diagnostic Info
- 67-Packet trace
- 68-Load balancing test
- 69-IPsec diagnosis
- 70-Risk analysis
- 71-Content moderation logs
- 72-Content security top
- Related Documents
-
Title | Size | Download |
---|---|---|
60-Terminal status | 28.64 KB |
Terminal status
This help contains the following topics:
Introduction
Terminal heat map
The terminal heat map offers a visual representation of the state of each terminal in each network segment. The terminal state can be normal, abnormal, or unreachable. You can search terminals by terminal state or block state. You can click the IP address of a terminal to take the following actions on the terminal:
· Approve—Approves the terminal as legal so the traffic from and to the terminal is permitted after the terminal information changes. After the information of a terminal changes, the traffic from and to the terminal will be denied if the terminal identification function is in whitelist mode and the action is block. If you trust the new terminal information, you can approve the terminal as legal after the terminal information changes.
· Reidentify—Clears all terminal information for an IP address and re-identifies the terminal.
· Block—Drops traffic from and to the terminal until the block duration expires or you unblock terminal.
The terminal heat map uses different colors to represent different states.
· Unused (Gray)—The device does not detect the traffic from the terminal that uses the IP address or the terminal remains unreachable for more than seven days..
· Normal (Green)—The device has detected the traffic from the terminal, and the traffic is between the bandwidth lower limit and the bandwidth upper limit.
· Abnormal (Orange)—The terminal is in abnormal state, which includes the following situations:
¡ Poorly connected—The traffic from the terminal is below the bandwidth lower limit or above the bandwidth upper limit.
¡ Illegally used—The IP address of the terminal is used by another illegal terminal. The device detects this situation when terminal information changes.
· Unreachable (Red)—The device detected the traffic from the terminal and then cannot detect the traffic. This state transitions to the Unused state after being kept for seven days.
· Blocked (Purple)—The IP address of the terminal is administratively blocked.
· Unknown (Brown)—The state of the terminal cannot be determined (whether the terminal is connected to the device cannot be determined).
Terminal information
This section displays information about and states of all terminals for monitoring purposes. By monitoring the MAC address, manufacturer, model information and approving information of a terminal, you can prevent its IP address from being illegally used or prevent it from being illegally replaced. You can block, unblock, approve, or re-identify a terminal as needed.
Restrictions and guidelines
The block function can be used only after you click Enable globally on the Policies > Attack Defense > Blacklist page.