Firegate Real-Time Threat Detection Dashboard #
The Firegate Security Box continuously monitors network traffic and protects devices by blocking malicious activity before it reaches the internal network. The dashboard shown above provides a real-time overview of how Firegate detects threats, drops malicious traffic, and monitors overall network activity.
This telemetry demonstrates how Firegate operates as an inline security gateway positioned between the modem and router. By analysing all incoming and outgoing traffic, Firegate can detect suspicious behaviour and prevent attackers from interacting with devices inside the network.
Threats Detected by Firegate #
The large red panel labelled “Threats Detected by Firegate” displays the total number of malicious probes detected during the monitoring period. In the example shown, Firegate identified 65 threat events targeting the network.
These events often originate from automated internet scanners, botnets, or malicious systems attempting to discover vulnerable devices. Such probes are extremely common on the public internet and may attempt to exploit open ports, weak services, or misconfigured network devices.
Because Firegate operates inline at the network edge, these threats are detected immediately and handled before they reach internal systems.
Dropped Threat Activity #
The “Firegate Dropped Threats” graph shows how many malicious packets or connection attempts were blocked over time. When Firegate’s intrusion prevention engine detects suspicious traffic, the system immediately drops the connection.
This ensures that malicious actors cannot establish communication with devices inside the network. The graph provides a clear visual representation of how frequently these blocked attempts occur and how attack activity fluctuates throughout the day.
Threat Detection Rate #
The “Firegate Threat Rate” panel displays how frequently threats are being detected during the monitoring window. This metric highlights the constant background noise of automated attacks that occur across the internet.
Even residential or small business networks are regularly targeted by scanning tools looking for vulnerable systems. Firegate continuously analyses this activity and identifies malicious behaviour in real time.
Network Activity Monitoring #
The “Firegate Network Activity” graph shows the volume and pattern of network traffic passing through the Firegate system. Monitoring traffic patterns helps identify abnormal behaviour that may indicate compromised devices, unusual connections, or potential security incidents.
Understanding normal network activity is important because deviations from this baseline can signal suspicious behaviour that requires further investigation.
Intrusion Prevention System (IPS) #
Firegate uses an enterprise-grade Intrusion Prevention System (IPS) powered by the Suricata detection engine. This system analyses network packets and evaluates them against thousands of known attack signatures and behavioural detection rules.
When suspicious activity is identified, Firegate automatically blocks the traffic and records the event in the system logs. This automated response allows Firegate to stop threats without requiring manual configuration or intervention.
Automated Protection at the Network Edge #
Firegate is designed to bring enterprise-level network protection to homes, remote workers, and small businesses. Once installed between the modem and router, the system begins analysing traffic immediately.
Protection operates automatically in the background, continuously monitoring network activity and blocking malicious traffic before it reaches internal devices.
The dashboard provides visibility into how Firegate actively defends the network perimeter against the constant stream of threats present on the modern internet.