Introduction, 5chapter 1 – Kerio Tech Network Monitor User Manual

Page 5

Advertising
background image

5

Chapter 1

Introduction

Kerio Network Monitor

is a small, though powerful tool for online monitoring of network

traffic. It offers a whole set of choices which activities and events can be monitored.

Line load chart

The online display of the Internet connection load (incoming and out-

going traffic) in the time range from 1 minute and 1 year. The average transfer speeds

are shown for 3 seconds (1 minute graph) up to for 3 days intervals (for 1 year graph).

Both the total traffic and the traffic for particular users (workstations in the network)

can be displayed at once. This way, you can quickly find out the workstation gener-

ating the biggest load on the Internet connection.

By default, the traffic for all available services (e.g. WWW, FTP, TELNET etc.) is dis-

played. Besides, the traffic for particular services (predefined or custom — deter-

mined by a protocol and a port number) can be displayed and their traffic can be

watched separately. The traffic is shown for particular IP addresses which can be

translated into the names of computers (taken from DNS or entered manually).

Total volume of data within a given time period

From acquired data you can identi-

fy, who in your network uses the Internet in the most intensive way. It is possible to

create statistics with a day, week or month increments (e.g. the last 2 months with

week increments for all or only some selected computers).

Current connections

It is possible to watch a in special window in (almost) real time,

which connections have the particular stations opened. The history of those connec-

tions is recorded in the (Connection Log).

Tree of captured data

Kerio Network Monitor

is able to store detail data of certain pro-

tocols (e.g. SMTP, POP3, IMAP, HTTP, etc.). The data is displayed as a neat tree, where

it can be sorted according to the stations (IP addresses) or the protocols. Optionally,

it is possible to store also the content of the sent E-mail and the visited WWW pages

(if they are not transferred using encrypted protocols).

Log of visited WWW pages

The HTTP Log window records all the captured HTTP re-

quests. The selection of a computer from the list is differentiated by color all request

generated by this particular station.

E-mail log

Window Mail Log stores information about all E-mail messages; both sent via

the SMTP protocol, as well as downloaded via the POP3 or the IMAP (if they were not

Advertising