Kerio Tech Network Monitor Computer Monitor User Manual


 
6.3 User Accounts
29
All traffic of ... protocol type Protocol, which is used by the given service. The pos-
sibilities are: TCP, UDP, ICMP (Internet Control Messages Protocol), PPTP (Point to
Point Tunneling Protocol ) and All (any protocol i.e. whole IP communication).
with port / subprotocol number Port number, which is used by the service (e.g. 25 =
SMTP, 80 = WWW etc.). The value0 (zero) means all ports (i.e. all communication with
the selected port).
Allow protocol statistics Separate logging of the data for this service. In the graph or
in the report, it will be possible to separately display the volume of the date trans-
ferred only by this service (for details see the chapters 7.2, 7.6).
If this option is on, attribute S appears in the column Flags.
Do the detailed protocol analysis Performs the detailed analysis of this service. This
option is available only for the standard services, where Kerio Network Monitor can
perform the analysis (HTTP, SMTP, POP3, IMAP4, FTP and DNS). The analysis results
(i.e. e.g. captured WWW pages, E-mail messages, transferred files, etc.) are displayed
to the Scanned data window, or possibly also to the appropriate log (HTTP Log, Mail
Log, ICQ Log). Details are to be found in the chapters 7.4 and 7.7.
If this option is on, attribute P appears in the column Flags.
Note: To define other parameters for protocol analysis use the Others option. To see
their detailed description refer to chapter 6.7.
Enable protocol debugger Detailed log of data for this service for purposes of techni-
cal support. This option can be used if you suspect that Kerio Network Monitor does
not log the data of appropriate service correctly. Obtained data can be handed to
technical support of the Kerio Technologies for further analysis.
If this option is on, attribute D appears in the column Flags.
Do not delete the debug information The detailed data of the service, stored for de-
bugging purposes (see the previous option), are rather large and could very quickly
fill in considerable amount of disk space. Therefore they are under normal conditions
deleted on each close of the monitored connection. By setting this option on, the data
will not be deleted automatically and will remain stored until manually deleted.
6.3 User Accounts
When the viewer is connecting to the Kerio Network Monitor Daemon service, the user
name and the password are required. It ensures that only the authorized users have