Kerio Tech Network Monitor Manual de usuario

Busca en linea o descarga Manual de usuario para Software Kerio Tech Network Monitor. Kerio Tech Network Monitor User's Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir

Indice de contenidos

Pagina 1 - User’s Guide

User’s GuideKerio Technologies

Pagina 2 - Printing date: April 10, 2003

Chapter 3 Technical Information10including headers, etc.). The information gathered by Kerio Network Monitor cantherefore differ from those acquired by

Pagina 3 - Contents

3.2 How does Kerio Network Monitor work?11data (the high resolution data — one file per day, the low resolution data — one file per28 days).Then there a

Pagina 4

Chapter 3 Technical Information12Warning: Subfolder license must remain in the same folder as the program files (i.e.where was Kerio Network Monitor or

Pagina 5 - Introduction

3.3 Technical Limitations13The most common case is the situation when the mail server runs on the computer thatis also the internet gateway. Kerio Net

Pagina 6 - Chapter 1 Introduction

Chapter 3 Technical Information14

Pagina 7 - Quick Checklist

15Chapter 4InstallationKerio Network Monitor can be installed on any computer in your local network runningWindows 95 OSR2, 98, Me, NT 4.0, 2000 or XP

Pagina 8 - Chapter 2 Quick Checklist

Chapter 4 Installation16NetMon Application Viewer. It can be installed on any number of computers, whereyou will connect to the service from.Note: We

Pagina 9 - Technical Information

4.2 Importing the License Key17Pressing the button Import license displays a dialog for opening the file with the license(license.key). When it is load

Pagina 10

Chapter 4 Installation18

Pagina 11

19Chapter 5Program Control5.1 Logging in the ViewerThe viewer can be started by choosing Programs → Kerio → Network Monitor in themenu Start. The logi

Pagina 12 - 3.3 Technical Limitations

C 2001–2003 Kerio Technologies. All rights reserved.Printing date: April 10, 2003Current product version: Kerio Network Monitor 2.1.0. All additional

Pagina 13

Chapter 5 Program Control20User authentication — enter your user name and password. In case you are loggingto Kerio Network Monitor for the first time

Pagina 14

5.3 Initial Configuration21cation (Installed (APP) — in Windows 9x/Me) or is not installed as service (Not installed(SVC)).Start Runs the service (if s

Pagina 15 - Installation

Chapter 5 Program Control22if the network address translation is used (NAT), we can see only the address of thecomputer, which Kerio Network Monitor i

Pagina 16 - Chapter 4 Installation

23Chapter 6ConfigurationAll settings of Kerio Network Monitor are done in the Configuration window, which canbe accessed by choosing Settings / Configura

Pagina 17 - 4.2 Importing the License Key

Chapter 6 Configuration24to the most general. The arrow buttons are used for moving the selected definitionup or down in the list.Definition of IP Addres

Pagina 18

6.1 IP Addresses Ranges25Domain type specification Type (domain) of IP addresses group. This option defines,how will the packets, whose source and targe

Pagina 19 - Program Control

Chapter 6 Configuration26• TCP protocol with port — the rule will be valid only for the TCP protocol and thegiven port. The protocol and the port define

Pagina 20 - Chapter 5 Program Control

6.2 Monitored Services27If your network is not created from cascading segments (e.g. more subnets intercon-nected by routers), you have not to define a

Pagina 21 - 5.3 Initial Configuration

Chapter 6 Configuration28List of services The window shows the list of the defined services (in the default set-tings, there is already predefined the ma

Pagina 22

6.3 User Accounts29All traffic of ... protocol type Protocol, which is used by the given service. The pos-sibilities are: TCP, UDP, ICMP (Internet Contr

Pagina 23 - Configuration

3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 24 - Chapter 6 Configuration

Chapter 6 Configuration30access to the data and the program configuration and no data breach or its intentionalfalsification by changing the configuration

Pagina 25 - 6.1 IP Addresses Ranges

6.3 User Accounts31User DefinitionThe dialog for definition of the user account will be shown after pressing the Add or Editbuttons .Username Name of th

Pagina 26

Chapter 6 Configuration32This right is in the column Rights in the list of the users shown as Conf .Change own password The user has the right to modif

Pagina 27 - 6.2 Monitored Services

6.4 Log Settings33The time for keeping of the data is determined by the two following parameters:• Data for the high resolution — data with the high r

Pagina 28

Chapter 6 Configuration34Note: If the computer with Kerio Network Monitor is turned off in the given time,maintenance will be performed on the next star

Pagina 29 - 6.3 User Accounts

6.6 WWW Interface Parameters35The ICMP protocol and UDP protocol options are used for setting the above describedintervals .TCP connection timeout The

Pagina 30

Chapter 6 Configuration36Daemon is installed, it is possible to use the standard port 80 — then it will be nolonger necessary to specify the port in th

Pagina 31

6.7 Additional Settings37Log access rights Access rights to the logs (No logs access at all — no logs, My ownlogs only — only logs for the computer wh

Pagina 32

Chapter 6 Configuration38Warning: Keep in mind that monitoring the contents of E-mail violates user privacy!If this option is not enabled, all the user

Pagina 33 - 6.4 Log Settings

6.7 Additional Settings39Note: If you want to compare data acquired by Kerio Network Monitor with data fromother programs or with the data from the In

Pagina 34

48 Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598.1 Connect

Pagina 36

41Chapter 7Viewing and Analysis of Captured DataKerio Network Monitor offers several tools for the presentation and analysis of the cap-tured data. The

Pagina 37 - 6.7 Additional Settings

Chapter 7 Viewing and Analysis of Captured Data42KNM access log Log of information on users connecting into the application and onaccess to the Web in

Pagina 38

7.1 List of Computers43Use of List of ComputersThe list of computers is important for presentation of chart (see chapter 7.2) and tableof transferred

Pagina 39

Chapter 7 Viewing and Analysis of Captured Data44Note: If the packet with the same IP address is detected anytime afterwards, thecomputer will be auto

Pagina 40

7.2 Traffic chart457.2 Traffic chartShows the chart of transferred data. The horizontal axis shows time, the vertical axisthe connection load (in bytes pe

Pagina 41 - Chapter 7

Chapter 7 Viewing and Analysis of Captured Data46axis to the maximum captured value in the given representation (the option is implicitlyturned on). T

Pagina 42 - 7.1 List of Computers

7.3 Current Connections47The Current connections window shows only the computers (or groups, respectively) thathave at least one connection open (the

Pagina 43

Chapter 7 Viewing and Analysis of Captured Data48Closed connections remain displayed in the Current connections window for timespecified in the program

Pagina 44

7.4 Tree of Scanned Data49Columns included in the connection list The user can select which columns (informa-tion) will be displayed in the Current co

Pagina 45 - 7.2 Traffic chart

5Chapter 1IntroductionKerio Network Monitor is a small, though powerful tool for online monitoring of networktraffic. It offers a whole set of choices wh

Pagina 46 - 7.3 Current Connections

Chapter 7 Viewing and Analysis of Captured Data50Tree of data (in the left part of the window) contains two base branches:• By client — data sorted ac

Pagina 47

7.5 Status Information51Stop current transfer Stops the transfer of the opening WWW pages (as in a browser)Refresh tree Updates information in a tree

Pagina 48

Chapter 7 Viewing and Analysis of Captured Data52• Packets filtered — number of filtered (discarded) packets — their source and targetaddress belongs to

Pagina 49 - 7.4 Tree of Scanned Data

7.6 Transferred Data Volume Table53Disk space used by logs The total disk space occupied by recorded files and the totalnumber of lines in these files.7

Pagina 50

Chapter 7 Viewing and Analysis of Captured Data54Example: If we set the extent of a table according to the previous example, buttonSuggest start date

Pagina 51 - 7.5 Status Information

7.7 Log Windows55Print the report Prints the table. This option opens a standard system print dialogwhere a printer etc. can selected.Save the report

Pagina 52

Chapter 7 Viewing and Analysis of Captured Data56Log files can be further processed by external analytical tools (e.g. by Kerio Log Analyzerapplication

Pagina 53

7.7 Log Windows57• GET — method of HTTP protocol (GET /POST )• http://www.kerio.com/resources/home.gif — complete URL of a requestedobject• HTTP/1.1 —

Pagina 54

Chapter 7 Viewing and Analysis of Captured Data58’c:\Program Files\Kerio\Network Monitor\logs\mail.idx’• Fri 8/Mar/2002 14:26:01 — date and time when

Pagina 55 - 7.7 Log Windows

59Chapter 8Web InterfaceKerio Netwok Monitor provides access to captured data using the basic Web interface.This interface can display a chart of conn

Pagina 56

Chapter 1 Introduction6transferred using encrypted connections). The sender address, the recipient addressand the size of sent message are stored.ICQ

Pagina 57

Chapter 8 Web Interface60If you want to display data about all computers in a local network, log in the loginsection. Information about all computers

Pagina 58

8.5 Page Connections61Select format Formats of the table (HTML page or file in CSV format)Specify report parameters Table parameters settings (see chap

Pagina 59 - Web Interface

Chapter 8 Web Interface62of transferred data volume or view of current connections etc.) can be integrated intoyour own web site in this way.General F

Pagina 60 - Chapter 8 Web Interface

8.7 Integration of the WWW Interface into the Company Website63Chart of Transferred Data VolumeThe following URL displays the page with the chart of t

Pagina 61 - 8.5 Page Connections

Chapter 8 Web Interface64http://netmon:81/chart/image.png?resolution=3&IP1=0.0.0.0&IP2=127.0.0.1&service=1This example shows an isolated c

Pagina 62

8.7 Integration of the WWW Interface into the Company Website65Value 1 2 3Meaning incoming (download) outgoing (upload) sum of both directions• servic

Pagina 63

Chapter 8 Web Interface66

Pagina 64

67Chapter 9Glossary of TermsE-mail address Determines message recipient and sender during communication usingthe electronic mail.HTTP Protocol for WWW

Pagina 65

Chapter 9 Glossary of Terms68Proxy server An older method of Internet connection sharing. Client in a local networkdoes not communicate directly with

Pagina 66

69Chapter 10Index31adapternetwork 21computersgroups 44list 42names 43connectionlog 56principle of watching 10connectionsactive 61current 46Daemon 9, 9

Pagina 67 - Glossary of Terms

7Chapter 2Quick ChecklistThis chapter gives you a basic step-by-step guide to quickly set up the important param-eters of Kerio Network Monitor progra

Pagina 69 - Chapter 10

Chapter 2 Quick Checklist8

Pagina 70

9Chapter 3Technical Information3.1 Kerio Network Monitor ComponentsKerio Network Monitor consists of two separate components:Watching service (Daemon)

Comentarios a estos manuales

Sin comentarios