Troubleshooting
Mode:
The Troubleshooting
Mode window displays when Troubleshooting is selected from the Diagnostics
menu in the navigation panel. This window is used if the server is
not sending or receiving packets as normal.
WARNING: Note that when using this tool system resources are utilized,
impacting the Web Filters performance. When you click Enable the
Web Filter will stop filtering the network. After you finish making the
necessary changes to the server, be sure to click Disable to terminate
your Troubleshooting Mode session. Once Disable is clicked, the
Web Filter will resume filtering the network.
Troubleshooting Mode frame
Click Enable to begin working in the troubleshooting mode.
Packet Logging frame
1. Select the Packet Logging Time from the available selections
(10 seconds, 30 seconds, 60 seconds). This time is the interval
during which the server captures packets in real time, ranging from
the moment the command is executed until the designated point of
time in the future.
2. At the Capture Device field, the default listening device for
the operation mode displays. If necessary, make a selection from
the pull-down menu that corresponds to the operation mode used on
the networkLAN1 or LAN2.
3. At the Promiscuous Mode field, the default choice (on or off)
displays, based on the operation mode that was selected. The promiscuous
mode is a mode of operation in which each data packet that is sent
will be received and read by the Network Interface Card (NIC).
If necessary, click the appropriate radio button to indicate whether
to turn the promiscuous mode on or off. If on is selected, the Web Filter
will watch all network traffic as in the invisible mode. If off
is selected, the Web Filter will only capture packets sent to or from
the Web Filter.
NOTE: See the Operation Mode window for more information about the
invisible, router, and firewall modes, and listening devices.
4. At the Capture String/Rule field, select the type of packets
to be captured: Transmission Control Protocol (TCP); Address Resolution
Protocol (ARP); packets destined to a specified port (80, 443, 81);
packets destined to the Web Filter; packets sent to or from port 20 or
21; or packets to the Virtual IP addresss port 137 or 139.
5. Click Execute to display results in the Result list box.
Back
| Top
|