21.7 Users’ Activity
281
The header informs about total number of recognized files, total volume of transferred
data (in both directions), data transferred via P2P networks (in both directions) and num-
ber of blocked attempts for sharing of files in P2P networks (this information is displayed
only if there was such attempt detected and blocked).
Types of records in the
Large File Transfers
category:
•
File downloads and uploads — the record includes name (or IP address) of the
server, volume of transferred data and name of the transferred file.
If the record points at download from a web server or from an anonymous FTP
server, the file name is displayed as a link. Clicking on the link downloads the
file.
•
Sharing (transfers) of files in P2P networks — the record includes name of de-
tected P2P network and volume of data transferred in each direction.
•
Blocked P2P file sharing attempts — information about attempts for file sharing
in P2P networks that was blocked by
P2P Eliminator
(see chapter
•
Unknown connection — any traffic between the local network and the Internet
within which more than 2 MB of data was transferred and which cannot be sorted
in another category (e.g. in
Multimedia
). The record includes name or IP address
of the server, protocol/service (if recognized) and volume of data transferred in
each direction.
Multimedia
The
Multimedia
category includes real-time transfers of multimedia data — so called
streaming
(typically online radio and television channels).
Figure 21.21
User’s Activity — multimedia
The header informs about total volume of data transferred by multimedia protocols and
total number of connections to such servers.
Records addressing individual activities include the following information:
•
Stream name (or URL, if the name is not available). Under certain circumstances,
name can be displayed as a link by which the stream can be opened.
•
Name (or IP address) of the server.
•
Volume of data transferred in each direction.
Remote Access
This category addresses remote access to Internet hosts (e.g.
Microsoft Remote Desktop
,
VNC
,
Telnet
and
SSH
) as well as VPN access to remote networks. Remote access (if not
used for work purposes) can be quite dangerous. User can use it to get round local firewall
Содержание Firewall6
Страница 1: ...Kerio WinRoute Firewall 6 Administrator s Guide Kerio Technologies...
Страница 129: ...8 5 HTTP cache 129...
Страница 404: ...404...