![3Com Traffix Transcend Traffix Manager User Manual Download Page 79](http://html1.mh-extra.com/html/3com/traffix-transcend-traffix-manager/traffix-transcend-traffix-manager_user-manual_441376079.webp)
Using Event Rules
79
The Map can provide you with immediate information about which
devices have been using particular servers.
Detecting Unauthorized Servers
You can use the Detect Network Sweep Attack rule to spot users creating
unauthorized servers on the network. For example, you can detect
unauthorized FTP servers by creating a rule which detects FTP traffic on
the network, but which ignores traffic to and from known FTP servers.
Monitoring WAN
Links and Backbone
Links
Monitoring Congestion on WAN Links
You can configure a Monitor Critical Connections event rule to inform
you when a link is becoming congested. You can either set an absolute
threshold at a level of traffic which you think is acceptable on the link, or
you can use the event rule to tell you when traffic levels on the link
change significantly. A Connection Activity report can be used to give you
regular information on the activity of a link. See
“Connection Activity
Report”
on
page 100
for more information.
Monitoring Single Devices Which are Overusing the Capacity of a
Link
You can configure a Monitor Network Resource Usage event rule to tell
you when one device is using a lot of bandwidth on a link. Similar
information can be obtained on a regular basis using a Top N
Connections report. See
“Top N Connections Report”
on
page 105
for
more information.
Detecting Network Misuse
Sometimes congestion on a link can be caused by misuse. You can
configure a Detect Network Misuse event rule to spot users using a WAN
link for Web traffic during working hours.
For example, if you know that a connection should only be used for Lotus
Notes traffic then you could configure a Detect Network Misuse rule to
spot any
application
except Notes. See
Chapter 4
,
“Grouping Network
Devices in the Map”
for more information about applications.
If you have a network with multiple servers in different sites, you can
configure a Detect Unauthorized Machine Access rule to make sure
people access their local server rather than accessing a server across a
WAN link.
Summary of Contents for Traffix Transcend Traffix Manager
Page 10: ......
Page 18: ......
Page 24: ...24 CHAPTER 1 TRAFFIX MANAGER OVERVIEW ...
Page 34: ......
Page 46: ...46 CHAPTER 4 GROUPING NETWORK DEVICES IN THE MAP Figure 6 Groupings dialog box ...
Page 48: ......
Page 56: ...56 CHAPTER 6 CONFIGURING AGENTS FOR DATA COLLECTION ...
Page 70: ...70 CHAPTER 8 DISPLAYING TRAFFIC IN GRAPHS ...
Page 88: ...88 CHAPTER 10 VIEWING EVENTS ...
Page 114: ......
Page 120: ...120 APPENDIX A TROUBLESHOOTING TRAFFIX MANAGER ...
Page 152: ...152 APPENDIX F SUPPORTED RMON 2 DEVICES ...
Page 156: ...156 APPENDIX G CONFIGURING 3COM STANDALONE RMON 2 AGENTS ...
Page 160: ...160 APPENDIX I USING RMON 1 AGENTS ...
Page 168: ......
Page 184: ...184 INDEX ...