Cisco Systems ASA Services Module Webcam User Manual


 
24-11
Cisco ASA Series Firewall ASDM Configuration Guide
Chapter 24 Troubleshooting Connections and Resources
Monitoring Connections
Step 2 Select one or more entries from the Available Graphs list, then click Add to move them to the Selected
Graphs list. To remove an entry from the Selected Graphs list, click Remove. The available options are
the following:
Free Memory—Displays the ASA free memory.
Used Memory—Displays the ASA used memory.
You can choose up to four types of statistics to show in one graph window. You can open multiple graph
windows at the same time.
Step 3 To use an existing window title, select one from the drop-down list. To display graphs in a new window,
enter a new window title in the Graph Window Title field.
Step 4 Click Show Graphs to view system resource statistics in a new or updated graph window.
Step 5 Click the Table tab to view the same performance statistics in a tabular format.
Step 6 From the View drop-down list on either tab, choose to display updates to information in the following
time periods: Real-time, data every 10 sec; Last 10 minutes, data every 10 sec; Last 60 minutes, data
every 1 min; Last 12 hours, data every 12 minutes; or Last 5 days, data every two hours.
Step 7 (Optional) Click Export to display the Export Graph Data dialog box. The selected memory utilization
statistics to export are already checked.
Step 8 (Optional) Click Export again to display the Save dialog box.
Step 9 (Optional) Click Save to save the memory utilization statistics to a text file (.txt) on your local drive for
future reference.
Step 10 (Optional) Click Print to display the Print Graph dialog box.
Step 11 (Optional) Choose the graph or table name from the drop-down list, then click Print to display the Print
dialog box.
Step 12 (Optional) Click OK to print the selected memory utilization statistics.
Monitoring Connections
To view current connections in a tabular format, in the ASDM main window, choose Monitoring >
Properties > Connections. Each connection is identified by the following parameters:
Protocol
Source:
Security ID
Security Name
IP address
Port
Destination:
Security ID
Security Name
IP address
Port