User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Safe@Office Appliance Status
310 Check Point Safe@Office User Guide
This field… Displays…
Resource Utilization
Safe@Office appliance resource utilization information.
A bar graph next to each resource indicates the amount currently
consumed.
Kernel Mem The percentage of used memory in the kernel module, followed by the
amount in kilobytes.
User Mem The percentage of used memory in the user module, followed by the
amount in kilobytes.
FW Mem The percentage of used memory in the firewall module, followed by the
amount in kilobytes.
System Mem The percentage of system memory in use, followed by the amount in
kilobytes.
Configuration The percentage of configuration storage space in use out of the total
amount of space allocated for configuration storage, followed by the
amount in kilobytes.
CPU The percentage of CPU in use.
Connections The percentage of established connections out of the licensed number
of connections, followed by the number of established connections.
VPN Tunnels The percentage of established VPN tunnels out of the licensed number
of VPN tunnels, followed by the number of established VPN tunnels.
Nodes The percentage of nodes in use out of the licensed number of nodes,
followed by the number of nodes in used.
Last Events
The last five messages logged to the Event Log.