Kerio Tech Network Monitor Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie Kerio Tech Network Monitor. Kerio Tech Network Monitor User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - User’s Guide

User’s GuideKerio Technologies

Strona 2 - Printing date: April 10, 2003

Chapter 3 Technical Information10including headers, etc.). The information gathered by Kerio Network Monitor cantherefore differ from those acquired by

Strona 3 - Contents

3.2 How does Kerio Network Monitor work?11data (the high resolution data — one file per day, the low resolution data — one file per28 days).Then there a

Strona 4

Chapter 3 Technical Information12Warning: Subfolder license must remain in the same folder as the program files (i.e.where was Kerio Network Monitor or

Strona 5 - Introduction

3.3 Technical Limitations13The most common case is the situation when the mail server runs on the computer thatis also the internet gateway. Kerio Net

Strona 6 - Chapter 1 Introduction

Chapter 3 Technical Information14

Strona 7 - Quick Checklist

15Chapter 4InstallationKerio Network Monitor can be installed on any computer in your local network runningWindows 95 OSR2, 98, Me, NT 4.0, 2000 or XP

Strona 8 - Chapter 2 Quick Checklist

Chapter 4 Installation16NetMon Application Viewer. It can be installed on any number of computers, whereyou will connect to the service from.Note: We

Strona 9 - Technical Information

4.2 Importing the License Key17Pressing the button Import license displays a dialog for opening the file with the license(license.key). When it is load

Strona 10

Chapter 4 Installation18

Strona 11

19Chapter 5Program Control5.1 Logging in the ViewerThe viewer can be started by choosing Programs → Kerio → Network Monitor in themenu Start. The logi

Strona 12 - 3.3 Technical Limitations

C 2001–2003 Kerio Technologies. All rights reserved.Printing date: April 10, 2003Current product version: Kerio Network Monitor 2.1.0. All additional

Strona 13

Chapter 5 Program Control20User authentication — enter your user name and password. In case you are loggingto Kerio Network Monitor for the first time

Strona 14

5.3 Initial Configuration21cation (Installed (APP) — in Windows 9x/Me) or is not installed as service (Not installed(SVC)).Start Runs the service (if s

Strona 15 - Installation

Chapter 5 Program Control22if the network address translation is used (NAT), we can see only the address of thecomputer, which Kerio Network Monitor i

Strona 16 - Chapter 4 Installation

23Chapter 6ConfigurationAll settings of Kerio Network Monitor are done in the Configuration window, which canbe accessed by choosing Settings / Configura

Strona 17 - 4.2 Importing the License Key

Chapter 6 Configuration24to the most general. The arrow buttons are used for moving the selected definitionup or down in the list.Definition of IP Addres

Strona 18

6.1 IP Addresses Ranges25Domain type specification Type (domain) of IP addresses group. This option defines,how will the packets, whose source and targe

Strona 19 - Program Control

Chapter 6 Configuration26• TCP protocol with port — the rule will be valid only for the TCP protocol and thegiven port. The protocol and the port define

Strona 20 - Chapter 5 Program Control

6.2 Monitored Services27If your network is not created from cascading segments (e.g. more subnets intercon-nected by routers), you have not to define a

Strona 21 - 5.3 Initial Configuration

Chapter 6 Configuration28List of services The window shows the list of the defined services (in the default set-tings, there is already predefined the ma

Strona 22

6.3 User Accounts29All traffic of ... protocol type Protocol, which is used by the given service. The pos-sibilities are: TCP, UDP, ICMP (Internet Contr

Strona 23 - Configuration

3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 24 - Chapter 6 Configuration

Chapter 6 Configuration30access to the data and the program configuration and no data breach or its intentionalfalsification by changing the configuration

Strona 25 - 6.1 IP Addresses Ranges

6.3 User Accounts31User DefinitionThe dialog for definition of the user account will be shown after pressing the Add or Editbuttons .Username Name of th

Strona 26

Chapter 6 Configuration32This right is in the column Rights in the list of the users shown as Conf .Change own password The user has the right to modif

Strona 27 - 6.2 Monitored Services

6.4 Log Settings33The time for keeping of the data is determined by the two following parameters:• Data for the high resolution — data with the high r

Strona 28

Chapter 6 Configuration34Note: If the computer with Kerio Network Monitor is turned off in the given time,maintenance will be performed on the next star

Strona 29 - 6.3 User Accounts

6.6 WWW Interface Parameters35The ICMP protocol and UDP protocol options are used for setting the above describedintervals .TCP connection timeout The

Strona 30

Chapter 6 Configuration36Daemon is installed, it is possible to use the standard port 80 — then it will be nolonger necessary to specify the port in th

Strona 31

6.7 Additional Settings37Log access rights Access rights to the logs (No logs access at all — no logs, My ownlogs only — only logs for the computer wh

Strona 32

Chapter 6 Configuration38Warning: Keep in mind that monitoring the contents of E-mail violates user privacy!If this option is not enabled, all the user

Strona 33 - 6.4 Log Settings

6.7 Additional Settings39Note: If you want to compare data acquired by Kerio Network Monitor with data fromother programs or with the data from the In

Strona 34

48 Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598.1 Connect

Strona 36

41Chapter 7Viewing and Analysis of Captured DataKerio Network Monitor offers several tools for the presentation and analysis of the cap-tured data. The

Strona 37 - 6.7 Additional Settings

Chapter 7 Viewing and Analysis of Captured Data42KNM access log Log of information on users connecting into the application and onaccess to the Web in

Strona 38

7.1 List of Computers43Use of List of ComputersThe list of computers is important for presentation of chart (see chapter 7.2) and tableof transferred

Strona 39

Chapter 7 Viewing and Analysis of Captured Data44Note: If the packet with the same IP address is detected anytime afterwards, thecomputer will be auto

Strona 40

7.2 Traffic chart457.2 Traffic chartShows the chart of transferred data. The horizontal axis shows time, the vertical axisthe connection load (in bytes pe

Strona 41 - Chapter 7

Chapter 7 Viewing and Analysis of Captured Data46axis to the maximum captured value in the given representation (the option is implicitlyturned on). T

Strona 42 - 7.1 List of Computers

7.3 Current Connections47The Current connections window shows only the computers (or groups, respectively) thathave at least one connection open (the

Strona 43

Chapter 7 Viewing and Analysis of Captured Data48Closed connections remain displayed in the Current connections window for timespecified in the program

Strona 44

7.4 Tree of Scanned Data49Columns included in the connection list The user can select which columns (informa-tion) will be displayed in the Current co

Strona 45 - 7.2 Traffic chart

5Chapter 1IntroductionKerio Network Monitor is a small, though powerful tool for online monitoring of networktraffic. It offers a whole set of choices wh

Strona 46 - 7.3 Current Connections

Chapter 7 Viewing and Analysis of Captured Data50Tree of data (in the left part of the window) contains two base branches:• By client — data sorted ac

Strona 47

7.5 Status Information51Stop current transfer Stops the transfer of the opening WWW pages (as in a browser)Refresh tree Updates information in a tree

Strona 48

Chapter 7 Viewing and Analysis of Captured Data52• Packets filtered — number of filtered (discarded) packets — their source and targetaddress belongs to

Strona 49 - 7.4 Tree of Scanned Data

7.6 Transferred Data Volume Table53Disk space used by logs The total disk space occupied by recorded files and the totalnumber of lines in these files.7

Strona 50

Chapter 7 Viewing and Analysis of Captured Data54Example: If we set the extent of a table according to the previous example, buttonSuggest start date

Strona 51 - 7.5 Status Information

7.7 Log Windows55Print the report Prints the table. This option opens a standard system print dialogwhere a printer etc. can selected.Save the report

Strona 52

Chapter 7 Viewing and Analysis of Captured Data56Log files can be further processed by external analytical tools (e.g. by Kerio Log Analyzerapplication

Strona 53

7.7 Log Windows57• GET — method of HTTP protocol (GET /POST )• http://www.kerio.com/resources/home.gif — complete URL of a requestedobject• HTTP/1.1 —

Strona 54

Chapter 7 Viewing and Analysis of Captured Data58’c:\Program Files\Kerio\Network Monitor\logs\mail.idx’• Fri 8/Mar/2002 14:26:01 — date and time when

Strona 55 - 7.7 Log Windows

59Chapter 8Web InterfaceKerio Netwok Monitor provides access to captured data using the basic Web interface.This interface can display a chart of conn

Strona 56

Chapter 1 Introduction6transferred using encrypted connections). The sender address, the recipient addressand the size of sent message are stored.ICQ

Strona 57

Chapter 8 Web Interface60If you want to display data about all computers in a local network, log in the loginsection. Information about all computers

Strona 58

8.5 Page Connections61Select format Formats of the table (HTML page or file in CSV format)Specify report parameters Table parameters settings (see chap

Strona 59 - Web Interface

Chapter 8 Web Interface62of transferred data volume or view of current connections etc.) can be integrated intoyour own web site in this way.General F

Strona 60 - Chapter 8 Web Interface

8.7 Integration of the WWW Interface into the Company Website63Chart of Transferred Data VolumeThe following URL displays the page with the chart of t

Strona 61 - 8.5 Page Connections

Chapter 8 Web Interface64http://netmon:81/chart/image.png?resolution=3&IP1=0.0.0.0&IP2=127.0.0.1&service=1This example shows an isolated c

Strona 62

8.7 Integration of the WWW Interface into the Company Website65Value 1 2 3Meaning incoming (download) outgoing (upload) sum of both directions• servic

Strona 63

Chapter 8 Web Interface66

Strona 64

67Chapter 9Glossary of TermsE-mail address Determines message recipient and sender during communication usingthe electronic mail.HTTP Protocol for WWW

Strona 65

Chapter 9 Glossary of Terms68Proxy server An older method of Internet connection sharing. Client in a local networkdoes not communicate directly with

Strona 66

69Chapter 10Index31adapternetwork 21computersgroups 44list 42names 43connectionlog 56principle of watching 10connectionsactive 61current 46Daemon 9, 9

Strona 67 - Glossary of Terms

7Chapter 2Quick ChecklistThis chapter gives you a basic step-by-step guide to quickly set up the important param-eters of Kerio Network Monitor progra

Strona 69 - Chapter 10

Chapter 2 Quick Checklist8

Strona 70

9Chapter 3Technical Information3.1 Kerio Network Monitor ComponentsKerio Network Monitor consists of two separate components:Watching service (Daemon)

Komentarze do niniejszej Instrukcji

Brak uwag