Chapter 8: the logs and reports menu – NEXCOM IFA 1610 User Manual

Page 3

Advertising
background image

Copyright © 2014 NEXCOM International Co., Ltd. All Rights Reserved.

iii

IFA 3610/IFA 2610/IFA 1610 User Manual

Contents

7.2.1 Add Tunnel Configuration ......................................... 61
7.2.2 Advanced Tunnel Configuration ................................ 61
7.2.3 Import Profile from OpenVPN Access Server ............... 63

7.3 IPsec ................................................................................ 63

7.3.1 IPsec .......................................................................... 63
7.3.2 IPsec Settings ............................................................. 64
7.3.3 Debug Options .......................................................... 64
7.3.4 Connections .............................................................. 64

7.4 L2TP ................................................................................ 66
7.5 Authentication ................................................................. 68

7.5.1 Users ......................................................................... 68
7.5.2 Groups ...................................................................... 70
7.5.3 Settings ..................................................................... 70

7.6 Certificates ...................................................................... 72

7.6.1 Certificates ................................................................ 72

7.7 Certificate Authority ........................................................ 73
7.8 Revoked Certificates ........................................................ 74
7.9 Certificate Revocation List ................................................ 74

Chapter 8: The Logs and Reports Menu

8.1 Dashboard ....................................................................... 75

8.1.1 Common elements .................................................... 75
8.1.2 Summary ................................................................... 76
8.1.3 System ...................................................................... 76
8.1.4 Web .......................................................................... 77
8.1.5 Mail ........................................................................... 77
8.1.6 Intrusion Attempts ..................................................... 77
8.1.7 Connections .............................................................. 77

8.2 Traffic Monitoring ............................................................ 78

8.2.1 Dashboard ................................................................. 78
8.2.2 Flows ......................................................................... 78
8.2.3 Hosts ......................................................................... 79
8.2.4 Interfaces .................................................................. 80

8.3 Live .................................................................................. 80
8.4 Common actions ............................................................. 81
8.5 Summary ......................................................................... 82
8.6 System ............................................................................. 82
8.7 Service ............................................................................. 82
8.8 Firewall ............................................................................ 83
8.9 Proxy ............................................................................... 83

8.9.1 HTTP and Content filter ............................................. 83
8.9.2 HTTP Report .............................................................. 83
8.9.3 SMTP ......................................................................... 83

8.10 Settings ......................................................................... 84
8.11 Trusted Timestamping .................................................... 85

Advertising
This manual is related to the following products: