Enterasys Networks Network Card Network Card User Manual


 
184 RiverMaster Administrators Guide
Report Contents
Chapter 8
Generating Reports
The report also indicates the ISP that was used for each session (or shows
Pre-existing Connection for non-dialed LAN link or cable modem
connections). In addition to the data described in the following table,
throughput averages and sums, and login session totals and average intervals
are reported for each user and ISP. This report also offers a drill-down view in
a subsequent display.
Table 16 lists the column headings and values that appear in a Client Report.
Table 16 Client Session Report Values
Heading Explanation
TIME IN Time the tunnel session started (according to the remote client
PCs clock) in the format:
Year
/
Month
/
Day Time
where
Time
is shown in military time.
TIME OUT Time the tunnel session ended (according to the remote client PCs
clock) in the format:
Year
/
Month
/
Day Time
where
Time
is shown in military time.
HOST NAME The computer name assigned to the remote clients computer.
PROTOCOL The security protocol used on the tunnel:
IPSEC-HTTPS
for an ANG that negotiated the IPSec and
HTTPS protocols.
PPTP
for an ANG that negotiated thePPTP protocol.
POP PHONE # Phone number of the POP that Aurorean Client dialed into (N/A
for clients using an existing Internet connection such as a cable
modem or LAN link).
FROM PHONE # The remote clients location phone number (the phone number
entered on the Aurorean Client From pullout).
CONN TYPE Type of connection(s) used by the remote client to reach the
Aurorean Network Gateway. Possible values include:
Both
for sessions involving a dial-up connection into a POP and
then a tunnel.
Tunnel
for tunnels that used an existing Internet connection
(LAN link or cable modem).