Advertising banner:
 
 
 8900
Home • Images • jp • OnlineHelp Repository • Pre 051212jhelp OnlineHelp • A0 • Form • 8900
 


Form tabs



Use this form to remotely monitor, control, and log Internet Services.



Protocols tab
Use this tab to check session load and Internet activity on your system, and to determine whether you need to modify any protocol settings.
Internet connection
Lights are green when you are connected to the Internet and black when you are not connected to the Internet.
Last reset
The last time the Internet Monitor was reset.
Version
The Internet Services version currently active.
Status
This light is green when the protocol is enabled, yellow if enabled but temporarily unavailable, and black if disabled.
Active connections
The current number of active connections for this protocol.
Peak
The LED lights to the right of the Totals bars on the Total lines.
Lights are black if none of the protocols in the group are enabled and green if at least one protocol in the group is enabled and there is no overload condition.
Lights are yellow if the number of current active connections reaches or exceeds 66% of the total connections you have defined for the group. If the LED is yellow, consider adding sessions.
Lights are red if the number of current active sessions reaches 100% of the total connections you have defined for the group. If the LED is red, this means service was denied, and you should add sessions if memory allows.
Lights will stay yellow or red until you click Reset or restart Internet Services.
Hits/Items
The total number of connections since you last clicked Reset.
Transferred
The amount of data, in kilobytes, transferred using this protocol since you last clicked Reset.
Reset button
Resets the date and time, clears the Hits/Items, and Transferred sections.
        Note
Monitor totals and Peak lights will only reset when you restart Internet Services.



Security tab
Use this tab to view information on suspected abuse of your Internet Services system.
Suspected Abuse or DOS
This section shows the details of IP addresses displaying suspicious behaviour. For each IP, you have two options:
•       block future connections from this IP address
•       clear the IP address from the list of suspicious IPs. This IP address will still show up on the list if it continues to display suspicious behavior
You can also clear all IP addresses from this list.
Connection attempts
This section displays a count of the number of accepted and rejected attempts to connect to Internet Services since the last update (typically one second).
SPAM emails
This section displays a count of the number of messages that are suspected of being SPAM and also the number of messages that Internet Services has automatically rejected, since the last update (typically one second).
RBL statistics
This section displays the statistics of your RBL host connections and actions taken by Internet Services based on your RBL servers.
Reset button
Clears the abuse count, suspects list, and warning lights.



Control tab
Use this tab to update Internet Services changes and empty your cache stores, shutdown, force connections, and reload configuration files.
Shutdown Internet Services
Shuts down Internet Services remotely.
Force Internet Connection
Tells Internet Services to dial in and connect to the internet (regardless of its scheduling settings), if Internet Services is running in dial-up mode (for example, without a full time Internet connection).
Reload Config
Forces Internet Services to reload the configuration form (InetSvcs.cf) or update changes made to web templates.
Tasking
Tasking does these tasks
•       logs all Internet Services tasks, which records all tasks up to moment you click the button, using the Log IS Task List button
•       creates more detailed logs using a semaphore and the Log Kernel Task List
•       records more detailed statistics to the InetSvcs.LOG file (Windows) or FCISD.log file (Unix daemon).
Tasks are logged to the Internet Services console (Windows) and, if Log to File is enabled, to the InetSvcs.LOG file (Windows) or to the FCISD.log file (Unix daemon). Both files are located in the same location as the Internet Services executable file.
Server priority
Sets the priority of Internet Services.
If you have Internet Services on a dedicated machine, you can set the priority to High without slowing down your system. If you have both the server and Internet Services running on the same machine, we recommend setting the priority to Medium for maximum system performance.
HTTP cache
Creates a temporary log file of HTTP activity and flushes HTTP cache. Activity is logged to the console (Windows) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or to the FCISD.log file (Mac OS X), located in the same location as the Internet Services executable file.
Flush your HTTP cache when you've made changes to web pages on your system, if you can't update your web site, or you are experiencing other refresh issues.
Blackholed connections
Creates a temporary list of currently blackholed IP addresses and writes that list to both the console and the log file.
Activity is logged to the console (except when running in daemon mode) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or in the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file.
IP blacklist
Creates a temporary list of currently blacklisted IP addresses and writes that list to both the console and the log file.
Activity is logged to the console (except when running in daemon mode) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or in the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file.
DNS cache
Creates a temporary log file of DNS activity and flushes the DNS cache for servers to which users send mail. Activity is logged to the console (Windows) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or in the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file.
Flush your DNS cache if you can't send mail to certain domains or you think your DNS is stuck.
POP3 import table
Creates a temporary log file of all the POP3 clients listed on users' Mail Import form. Activity is logged to the console (Windows) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or to the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file.
Write log to disk button
Creates a temporary log file (per session) of all Internet Services activity.
Activity is logged to the console (Windows) or, if Console to File is enabled, to the InetSvcs.LOG file (Windows) or in the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file.
Insert marker in log button
Marks a position on the console or in the log file by inserting Internet Services Information. This option is useful if you have a very large log file and you want to separate information for easier reading.



Logging Levels tab
Use this tab to set log levels for debugging categories used in the Internet Services log file, InetSvcs.LOG file (Windows) or in the FCISD.log file (Unix daemon), located in the same location as the Internet Services executable file. For information on logging and debugging Internet Services and for an explanation of the debug categories, see Debugging and debug categories.
        Note
You can access the same debug levels from the Internet Services console (except when running as a Unix daemon) located on your Internet Services machine.


hirosue Shino Web Site