5-5
Resources and Modes
Remote Resources
5
Hovering the mouse over a top-level node which has an alias displays the name
with the IP Address in parenthesis along with the optional comment. For example,
“Chicago Node One (192.1.68.2). This is Mount Prospect node”.
Resource Protection
You are in control of local resources within a PC. Use the functions on the
Host
menu to add and delete users for a resource, change passwords and protections, or
view the users currently logged in. There is a guest account for users with no
account. The guest user can be given all privileges to effectively disable resource
protection.
Note that there is no password protection for starting Surveyor on the local system.
If you can start Surveyor from a system, you automatically have complete access to
all local resources (called super-user privileges).
To access a remote resource, you must have an account and password set up on the
remote system containing the resource or use the guest account.
Privileges for remote users can be set to those described in Table 5-1 below:
Table 5-1. Remote User Privileges
Privilege
Description
Monitor Only
Allows a remote user to use the local device to monitor network activ-
ity only. You can access real-time monitor views on an armed (started)
module, but cannot start/stop a module or define/load a filter.
Capture/Monitor
Allows a remote user to use the local device to monitor activity or cap-
ture network data. You can perform all Monitor Only functions, capture
data, and perform full seven-layer decode on the packets. You can
start/stop a module, define/load a filter, and edit the contents of pack-
ets.
Full
Allows a remote user to use the local device to monitor activity, cap-
ture network data, or transmit network data. You can perform all Cap-
ture/Monitor functions plus all traffic generation capabilities available
through Surveyor.
Super User
Allows a remote user the ability to transmit, capture, or monitor, plus
set up, delete, and change accounts for the local PC. You have Full
access plus the ability to configure a deployed THGs, change the
access table, and unlock any locked module. Be careful when granting
super-user privileges to remote users. This gives remote users com-
plete control of your local resource.
Summary of Contents for Surveyor
Page 1: ...Surveyor User s Guide ...
Page 30: ...1 10 Surveyor User s Guide ...
Page 40: ...2 10 Surveyor User s Guide ...
Page 88: ...4 28 Surveyor User s Guide ...
Page 184: ...8 16 Surveyor User s Guide ...
Page 204: ...9 20 Surveyor User s Guide ...
Page 207: ...10 3 Expert Features Getting Started with Expert View10 Figure 10 1 Expert Overview Example ...
Page 211: ...10 7 Expert Features Expert Layers 10 Figure 10 3 Expert Application Layer Example ...
Page 368: ...11 34 Surveyor User s Guide ...
Page 390: ...13 12 Surveyor User s Guide ...
Page 416: ...C 4 Surveyor User s Guide ...
Page 426: ...D 10 Surveyor User s Guide ...
Page 454: ...Index 14 Surveyor User s Guide ...