6.3 User Accounts
29
All traffic of ... protocol type
Protocol, which is used by the given service. The pos-
sibilities are:
TCP
,
UDP
,
ICMP
(Internet Control Messages Protocol),
PPTP
(Point to
Point Tunneling Protocol ) and
All
(any protocol — i.e. whole IP communication).
with port / subprotocol number
Port number, which is used by the service (e.g.
25
=
SMTP,
80
= WWW etc.). The value
0
(zero) means all ports (i.e. all communication with
the selected port).
Allow protocol statistics
Separate logging of the data for this service. In the graph or
in the report, it will be possible to separately display the volume of the date trans-
ferred only by this service (for details see the chapters
7.2
,
7.6
).
If this option is on, attribute
S
appears in the column
Flags
.
Do the detailed protocol analysis
Performs the detailed analysis of this service. This
option is available only for the standard services, where
Kerio Network Monitor
can
perform the analysis (
HTTP
,
SMTP
,
POP3
,
IMAP4
,
FTP
and
DNS
). The analysis results
(i.e. e.g. captured WWW pages, E-mail messages, transferred files, etc.) are displayed
to the
Scanned data
window, or possibly also to the appropriate log (
HTTP Log
,
Log
,
ICQ Log
). Details are to be found in the chapters
7.4
and
7.7
.
If this option is on, attribute
P
appears in the column
Flags
.
Note:
To define other parameters for protocol analysis use the
Others
option. To see
their detailed description refer to chapter
6.7
.
Enable protocol debugger
Detailed log of data for this service for purposes of techni-
cal support. This option can be used if you suspect that
Kerio Network Monitor
does
not log the data of appropriate service correctly. Obtained data can be handed to
technical support of the
Kerio Technologies
for further analysis.
If this option is on, attribute
D
appears in the column
Flags
.
Do not delete the debug information
The detailed data of the service, stored for de-
bugging purposes (see the previous option), are rather large and could very quickly
fill in considerable amount of disk space. Therefore they are under normal conditions
deleted on each close of the monitored connection. By setting this option on, the data
will not be deleted automatically and will remain stored until manually deleted.
6.3 User Accounts
When the viewer is connecting to the
Kerio Network Monitor Daemon
service, the user
name and the password are required. It ensures that only the authorized users have
Содержание Network Monitor
Страница 1: ...User s Guide Kerio Technologies...
Страница 8: ...Chapter 2 Quick Checklist 8...
Страница 14: ...Chapter 3 Technical Information 14...
Страница 18: ...Chapter 4 Installation 18...
Страница 40: ...Chapter 6 Configuration 40...
Страница 66: ...Chapter 8 Web Interface 66...
Страница 70: ......