9
U
SING
E
VENT
R
ULES
This chapter describes how to use event rules to analyze the data
collected by Traffix
™
Manager and to inform you of traffic changes on
your network.
This chapter contains the following sections:
■
Overview
■
Predefined Event Rules
■
Examples of Event Rules
■
Configuring Event Rules
■
Using Event Rules
Overview
Using Traffix Manager, you can set up event rules
to provide you with
information about the security of your network, and the level of traffic on
the network. Event rules are applied to traffic data as it is collected. When
the conditions of a rule are met, Traffix Manager generates one or more
events which you can view in the Event List.
See
Chapter 10
for more information on viewing events and analyzing
the causes of events.
Rule-based event generation provides you with the following benefits for
proactive network monitoring:
■
It enables you to monitor security policies without having to examine
map data manually.
■
It provides you with a configurable way of automatically analyzing
collected data, informing you when unusual events occur.
■
It gives you an easy way of producing related map and graph displays
when events occur, without complex configuration.
Summary of Contents for Traffix Transcend Traffix Manager
Page 10: ......
Page 18: ......
Page 24: ...24 CHAPTER 1 TRAFFIX MANAGER OVERVIEW ...
Page 34: ......
Page 46: ...46 CHAPTER 4 GROUPING NETWORK DEVICES IN THE MAP Figure 6 Groupings dialog box ...
Page 48: ......
Page 56: ...56 CHAPTER 6 CONFIGURING AGENTS FOR DATA COLLECTION ...
Page 70: ...70 CHAPTER 8 DISPLAYING TRAFFIC IN GRAPHS ...
Page 88: ...88 CHAPTER 10 VIEWING EVENTS ...
Page 114: ......
Page 120: ...120 APPENDIX A TROUBLESHOOTING TRAFFIX MANAGER ...
Page 152: ...152 APPENDIX F SUPPORTED RMON 2 DEVICES ...
Page 156: ...156 APPENDIX G CONFIGURING 3COM STANDALONE RMON 2 AGENTS ...
Page 160: ...160 APPENDIX I USING RMON 1 AGENTS ...
Page 168: ......
Page 184: ...184 INDEX ...