Network > Network Profiles > Monitor
A monitor profile is used to monitor IPSec tunnels and to monitor a next-hop device for policy-based forwarding (PBF) rules. In both cases, the monitor profile is used to specify an action to take when a resource (IPSec tunnel or next-hop device) becomes unavailable. Monitor profiles are optional, but can be very useful for maintaining connectivity between sites and to ensure that PBF rules are maintained. The following settings are used to configure a monitor profile.
Enter a name to identify the monitor profile (up to 31 characters). The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Specify an action to take if the tunnel is not available. If the threshold number of heartbeats is lost, the firewall takes the specified action.
In both cases, the firewall tries to negotiate new IPSec keys to accelerate the recovery.
Specify the time between heartbeats (range is 2-10; default is 3).
Specify the number of heartbeats to be lost before the firewall takes the specified action (range is 2-10; default is 5).
Define a Tunnel Monitoring Profile
Define a Tunnel Monitoring Profile A tunnel monitoring profile allows you to verify connectivity between the VPN peers; you can configure the tunnel interface to ...
Path Monitoring for PBF
Path Monitoring for PBF Path monitoring allows you to verify connectivity to an IP address so that the firewall can direct traffic through an alternate ...
Configure HA Settings
Configure HA Settings To configure HA settings, select Device High Availability and then, for each group of settings, specify the corresponding information described in the ...
Create a Policy-Based Forwarding Rule
Create a Policy-Based Forwarding Rule Use a PBF rule to direct traffic to a specific egress interface on the firewall and override the default path ...
Policy Based Forwarding Forwarding Tab
Policy Based Forwarding Forwarding Tab Select the Forwarding tab to define the action and network information that will be applied to traffic that matches the ...
Configure Tunnel Content Inspection
Configure Tunnel Content Inspection Perform this task to configure tunnel content inspection for a tunnel protocol that you allow in a tunnel. Create a Security ...
Provide Granular Access to the Network Tab
Provide Granular Access to the Network Tab When deciding whether to allow access to the Network tab as a whole, determine whether the administrator will ...
IPSec Tunnel General Tab
IPSec Tunnel General Tab Network > IPSec Tunnels > General Use the following fields to set up an IPSec tunnel. IPSec Tunnel General Settings Description ...
Configure Active/Active HA
Configure Active/Active HA The following procedure describes the basic workflow for configuring your firewalls in an active/active configuration. However, before you begin, Determine Your Active/Active ...