On This Page
Setting Timing for Monitoring
Overview
By default, the settings on this page affect all devices that are monitored in the relevant monitoring mode (real time, periodic polling, or OS monitoring). The administrator can override these settings, for each specific monitored device, in the properties for that device (Monitoring > Devices > select device > Edit configuration). In some cases, the monitoring mode itself can be set there as well.
Polling and fetching, as described on this page, are the same action. This action initially sends a request, from TOS to the device, to receive policy data. TOS then compares this data with the last revision received and if there is a difference, the newly updated policy from the device appears in TOS as a new revision. The difference between polling and fetching is in the context in which they are used.
Starting from R25-1 PHF1.0.0, TOS Aurora uses a dynamic polling interval for devices based on revision processing time which improves stability by preventing a backlog of accumulated revisions. This will override previously defined polling intervals.
Monitoring settings
| Setting Group | Description | Vendors |
|---|---|---|
| Monitoring |
Real Time Monitoring
|
Check Point management devices, and to Cisco, Fortinet, and Juniper, and Palo Alto devices that have been configured to send syslogs to SecureTrack (unless in the device's properties real-time monitoring has been disabled) |
|
Periodic Monitoring
|
TOP, Palo Alto, Juniper, Fortiner, F5 BIG-IP LTM, Cisco devices and cloud providers that do not send syslogs or have had real-time monitoring disabled in the device properties | |
|
Management Periodic Monitoring
|
Stonesoft SMC, Panorama, Fortianager, Cisco FMC, Cisco ACI and Arista EOS that do not send syslogs or have had real-time monitoring disabled in the device properties | |
|
OS Monitoring:
|
N/A | |
| Database Update |
Rule and Object Usage
|
Does not apply to Cisco devices |
| SSH/Telnet session timeout | Length of time that SecureTrack waits for a response from device before giving up. This setting is used in case a device is down or too busy. Applies to Automatic fetch (for real-time monitored devices) and to Periodic polling | N/A |
| SSH host key mismatch handling |
Replace SSH host key automatically: Select to replace SSH host key automatically when a new SSH host key is detected for a device. Warning: Automatic replacement of the SSH host key can expose your server to security risks and is not recommended.
|
N/A |
What Can I do Here?
From the Timing screen, administrators can configure:
- Timing values for policy retrieval, device polling, and database updating
- SSH host key mismatch handling where you can choose to replace SSH host key automatically when a new SSH host key is detected for a device
For changes to take effect, you must click Save.
How Do I Get Here?
In SecureTrack, go to Monitoring
> Timing.
_header.png)