Intrusion Protection

Would you know if your network were hacked?

One of our retainer services is a hardware based firewall made by untangle. All inbound and outbound internet traffic both hardwired and wifi are monitored with activity alerts for suspicious connections. 

The untangle hardware appliance is a firewall router that provides 24×7 protection for all of you internal internet attached devices.  I addition to the standard reports illustrated below, the router interface has extensive configuration options for the most demanding requirements.  Online documentation and live support are some of the best I have seen.

Blocked Intrusions

The Firewall application works to block traffic by IP addresses and/or ports. For well-behaved applications (such as legitimate web and email servers) the port can be used to identify the protocol. Less than legitimate applications may use different ports, or malicious users may deliberately use unwanted services on obscure ports.

Scanned Sessions

  Scanned Sessions The amount of scanned and blocked sessions over time. Blocked Sessions The amount of blocked sessions over time. Top Blocked Usernames The number of blocked sessions grouped by username. Top Blocked Clients The number of blocked sessions grouped by client. Top Blocked Ports The number of blocked sessions grouped by server port.

Memory Usage

The Memory Usage report displays the actual usage of the real or physical RAM. This graph can give you an indication of an issue occurring over a time period. Green indicates usage, white indicates free memory. The Swap Usage report, naturally, displays the amount of memory swap that is occurring on the appliance.

Disk Usage

What it is. This script will run and give you a detailed report on what is using your disk space. This script will not free up any space, only give you a report.

CPU Load

 Normal CPU load for any site will depend on the normal traffic load as seen by the CPU, and can vary a LOT depending on the number of CPU cores and disk throughput of the server in question. Yes, the number of cores do matter. In a very rough sense, 1.0 CPU load corresponds to enough work to keep one CPU core busy full time.

Bandwidth Usage

gives you the power to monitor and control bandwidth usage on your network. It can be used to ensure that your network continues to operate smoothly and that bandwidth is shared optimally based on what is important to you. Many organizations struggle with bandwidth problems such as students watching online videos or clients …

Sessions

 Sessions provides a view of the current sessions (also known as connections). Each row represents a single a network session/and its properties. As NG Firewall and all the apps learn more about a session, many will “attach” data to the session so it is globally visible and accessible to other apps.

Hosts

Hosts provides a view of all current “hosts” or unique IP address on the local network (s). Each row represents a single a host (unique IP address) that has been seen on any LAN interface. As NG Firewall scans and processes network traffic, the platform and many of the apps will save information about a host on the network.

Leave a Comment

Your email address will not be published. Required fields are marked *