3 user accounts 29, 3 user accounts – Kerio Tech Network Monitor User Manual

Page 29

Advertising
background image

6.3 User Accounts

29

All traffic of ... protocol type

Protocol, which is used by the given service. The pos-

sibilities are: TCP, UDP, ICMP (Internet Control Messages Protocol), PPTP (Point to

Point Tunneling Protocol ) and All (any protocol — i.e. whole IP communication).

with port / subprotocol number

Port number, which is used by the service (e.g. 25 =

SMTP, 80 = WWW etc.). The value0 (zero) means all ports (i.e. all communication with

the selected port).

Allow protocol statistics

Separate logging of the data for this service. In the graph or

in the report, it will be possible to separately display the volume of the date trans-

ferred only by this service (for details see the chapters

7.2

,

7.6

).

If this option is on, attribute S appears in the column Flags.

Do the detailed protocol analysis

Performs the detailed analysis of this service. This

option is available only for the standard services, where Kerio Network Monitor can

perform the analysis (HTTP, SMTP, POP3, IMAP4, FTP and DNS). The analysis results

(i.e. e.g. captured WWW pages, E-mail messages, transferred files, etc.) are displayed

to the Scanned data window, or possibly also to the appropriate log (HTTP Log, Mail

Log

, ICQ Log). Details are to be found in the chapters

7.4

and

7.7

.

If this option is on, attribute P appears in the column Flags.

Note:

To define other parameters for protocol analysis use the Others option. To see

their detailed description refer to chapter

6.7

.

Enable protocol debugger

Detailed log of data for this service for purposes of techni-

cal support. This option can be used if you suspect that Kerio Network Monitor does

not log the data of appropriate service correctly. Obtained data can be handed to

technical support of the Kerio Technologies for further analysis.

If this option is on, attribute D appears in the column Flags.

Do not delete the debug information

The detailed data of the service, stored for de-

bugging purposes (see the previous option), are rather large and could very quickly

fill in considerable amount of disk space. Therefore they are under normal conditions

deleted on each close of the monitored connection. By setting this option on, the data

will not be deleted automatically and will remain stored until manually deleted.

6.3 User Accounts

When the viewer is connecting to the Kerio Network Monitor Daemon service, the user

name and the password are required. It ensures that only the authorized users have

Advertising