RS-1000 Manual - kamery airlive airlivecam
RS-1000 Manual - kamery airlive airlivecam RS-1000 Manual - kamery airlive airlivecam
AlarmIn this chapter, the Administrator can view traffic alarms and event alarms that occur and theSecurity Bandwidth Manager has logged.Security Bandwidth Manager has two alarms: Traffic Alarm and Event Alarm.Traffic alarm:In control policies, the Administrator set the threshold value for traffic alarm. The Systemregularly checks whether the traffic for a policy exceeds its threshold value and adds a recordto the traffic alarm file if it does.Event alarm:When Security Bandwidth Manager detects attacks from hackers, it writes attacking data inthe event alarm file and sends an e-mail alert to the Administrator to take emergency steps.How to apply Traffic AlarmThe administrator can use Traffic Alarm to track the Source Address, Destination Address,network service and the status of network. The administrator can save Traffic Logs and EventLogs for a pre-determined time and then delete them to keep the newest log.147
Traffic AlarmIn control policies, the Administrator set the threshold value for traffic alarm. The Systemregularly checks whether the traffic for a policy exceeds its threshold value and adds a recordto the traffic alarm file if it does.Entering the Traffic Alarm windowStep 1. Click the Traffic Alarm option below Alarm menu to enter the Traffic Alarmwindow.!!Figure11-1 Traffic AlarmStep 2. The table in the Traffic Alarm window displays the current traffic alarm logs forconnections." Time: The start and stop time of the specific connection." Source: Name of the source network of the specific connection." Destination: Name of the destination network of the specificconnection." Service: Service of the specific connection." Traffic: Traffic (in Kbytes/Sec) of the specific connection.148
- Page 101 and 102: STEP 4.When user_1 is going to acce
- Page 103 and 104: OutgoingThis section describes step
- Page 105 and 106: 100Adding a new Outgoing PolicyClic
- Page 107 and 108: 102Modifying an Outgoing policyStep
- Page 109 and 110: Removing the Outgoing PolicyStep 1.
- Page 111 and 112: 106fourth column is the Alarm Thres
- Page 113 and 114: Adding an Incoming PolicyUnder Inco
- Page 115 and 116: Modifying Incoming PolicyStep 1. In
- Page 117 and 118: Removing an Incoming PolicyStep 1.
- Page 119 and 120: URL BlockingThe Administrator may s
- Page 121 and 122: Adding a URL Blocking policyStep 1.
- Page 123 and 124: Removing a URL Blocking policyStep
- Page 125 and 126: Virtual ServerThe Security Bandwidt
- Page 127 and 128: Mapped IPInternal private IP addres
- Page 129 and 130: Modifying a Mapped IPStep 1. In the
- Page 131 and 132: Virtual ServerVirtual server is a o
- Page 133 and 134: Modifying a Virtual Server IP Addre
- Page 135 and 136: Setting the Virtual Server’s serv
- Page 137 and 138: Modifying the Virtual Server config
- Page 139 and 140: LogThe Security Bandwidth Manager s
- Page 141 and 142: Downloading the Traffic LogsThe Adm
- Page 143 and 144: Event LogWhen the Security Bandwidt
- Page 145 and 146: Clearing the Event LogsThe Administ
- Page 147 and 148: Download LogsStep 1. Click Log in t
- Page 149 and 150: Log BackupStep 1. Click Log $Log Ba
- Page 151: Disable Log Mail Support & Syslog M
- Page 155 and 156: Clearing the Traffic Alarm LogsStep
- Page 157 and 158: Downloading the Event Alarm LogsThe
- Page 159 and 160: Accounting ReportAccounting Report
- Page 161 and 162: Outbound Accounting ReportStep 1. C
- Page 163 and 164: Outbound Destination IP Accounting
- Page 165 and 166: Outbound Service Accounting ReportS
- Page 167 and 168: InboundStep 1. Click Service in the
- Page 169 and 170: Inbound Destination IP Accounting R
- Page 171 and 172: Inbound Service Accounting ReportSe
- Page 173 and 174: StatisticsIn this chapter, the Admi
- Page 175 and 176: WAN StatisticsStep 1. Click Statist
- Page 177 and 178: Entering the Policy SatisticsStep 1
- Page 179 and 180: Interface StatusEntering the Interf
- Page 181 and 182: ARP TableEntering the ARP Table win
- Page 183 and 184: Setup ExamplesExample 1: Allow the
- Page 185 and 186: 180
- Page 187 and 188: Step 8. Go to the Incoming window u
- Page 189 and 190: Step 6. In the Add New Policy windo
- Page 191 and 192: Step 7. Click the New Entry button.
- Page 193 and 194: Install a server inside the LAN net
- Page 195 and 196: Step 9. After adding new server IP,
- Page 197: Step 14. In the Add New Policy wind
AlarmIn this chapter, the Administrator can view traffic alarms and event alarms that occur and theSecurity Bandwidth Manager has logged.Security Bandwidth Manager has two alarms: Traffic Alarm and Event Alarm.Traffic alarm:In control policies, the Administrator set the threshold value for traffic alarm. The Systemregularly checks whether the traffic for a policy exceeds its threshold value and adds a recordto the traffic alarm file if it does.Event alarm:When Security Bandwidth Manager detects attacks from hackers, it writes attacking data inthe event alarm file and sends an e-mail alert to the Administrator to take emergency steps.How to apply Traffic AlarmThe administrator can use Traffic Alarm to track the Source Address, Destination Address,network service and the status of network. The administrator can save Traffic Logs and EventLogs for a pre-determined time and then delete them to keep the newest log.147