![8e6 Technologies TAR User Manual Download Page 126](http://html.mh-extra.com/html/8e6-technologies/tar/tar_user-manual_445774126.webp)
B
ANDWIDTH
M
ANAGEMENT
S
ECTION
C
HAPTER
1: M
ONITOR
B
ANDWIDTH
G
AUGES
114
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
Fig. 4:1-6 Port gauge ranking table
By default, this window includes rows of records for each
end user who is affecting this port gauge. For each
record in the list, the following information displays: user
IP address, and corresponding Score in bytes. End users
are ranked in descending order by their byte score.
TIP
: To view current port gauge activity for outbound end user
traffic, click Outbound; for inbound traffic, click Inbound.
4. To drill down and view additional information about an
end user’s activity, click the IP address to highlight it.
5. Click
User Summary
to open the Individual User View
pop-up window (see Fig. 4:1-7), and perform any of the
actions described for this window (see Monitor, Restrict
Bandwidth Usage).
6. Click the “X” in the upper right corner of this pop-up
window to close it.
Summary of Contents for TAR
Page 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Page 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...