Cisco Cisco FirePOWER Appliance 8130
55-26
FireSIGHT System User Guide
Chapter 55 Using Health Monitoring
Configuring Health Policies
You must apply the health policy to the appropriate devices if you want your settings to take effect. See
for more information.
Configuring Traffic Status Monitoring
FireSIGHT
Use the Traffic Status health status module to detect whether a device receives traffic. If the Traffic
Status module determines that a device does not receive traffic, the status classification for that module
changes to Critical. That status data feeds into the health monitor.
Status module determines that a device does not receive traffic, the status classification for that module
changes to Critical. That status data feeds into the health monitor.
Note
Interfaces labeled
DataPlaneInterfacex
, where
x
is a numerical value, are internal ASA interfaces (not
user-defined) and involve packet flow within the system.
To configure Traffic Status health module settings:
Access:
Admin/Maint
Step 1
In the Health Policy Configuration page, select
Traffic Status
.
The Health Policy Configuration — Traffic Status page appears.
Step 2
Select
On
for the
Enabled
option to enable use of the module for health status testing.
Step 3
You have three options:
•
To save your changes to this module and return to the Health Policy page, click
Save Policy and Exit
.
•
To return to the Health Policy page without saving any of your settings for this module, click
Cancel
.
•
To temporarily save your changes to this module and switch to another module’s settings to modify,
select the other module from the list at the left of the page. If you click
select the other module from the list at the left of the page. If you click
Save Policy and Exit
when you
are done, all changes you made will be saved; if you click
Cancel
, you discard all changes.
You must apply the health policy to the appropriate devices if you want your settings to take effect. See
for more information.
Configuring URL Filtering Monitoring
License:
URL Filtering
Supported Defense Centers:
Any except DC500
Use the URL Filtering Monitor module to track communications between the Defense Center and the
Cisco cloud, where the system obtains its URL filtering (category and reputation) data for commonly
visited URLs. If the Defense Center fails to successfully communicate with or retrieve an update from
the cloud, the status classification for that module changes to Critical.
Cisco cloud, where the system obtains its URL filtering (category and reputation) data for commonly
visited URLs. If the Defense Center fails to successfully communicate with or retrieve an update from
the cloud, the status classification for that module changes to Critical.
In a high availability configuration, only the primary Defense Center communicates with the URL
filtering cloud; all data from this module refers only to that primary appliance.
filtering cloud; all data from this module refers only to that primary appliance.