Previous Topic: Tunnel Example

Next Topic: Understanding Historical Network Performance


How You Use IP Security Monitoring Attributes

A STACK resource provides IP Security Monitoring attributes. You can use these attributes to collect statistical information. You can set alerts to warn you of abnormal attribute values.

The following process shows you how to implement IP Security Monitoring:

  1. Activate IP Security Monitoring:
    1. Enter /IPMON and then UM next to a STACK resource on the current system.
    2. Use the A (Activate) action to activate IP Security Monitoring.
  2. Set attribute alerts. Set alerts for the IP Security Monitoring attributes as required. The attributes have the following prefixes:

    For example, IKEKeyMsgFailedAuth monitors the number of key exchange (phase 1) message authentication failures for the stack during IKE Phase 1 negotiations. You can set an alert to warn you if the number exceeds a specified threshold.