3 user accounts 29, 3 user accounts – Kerio Tech Network Monitor User Manual
Page 29

6.3 User Accounts
29
All traffic of ... protocol type
Protocol, which is used by the given service. The pos-
sibilities are: TCP, UDP, ICMP (Internet Control Messages Protocol), PPTP (Point to
Point Tunneling Protocol ) and All (any protocol — i.e. whole IP communication).
with port / subprotocol number
Port number, which is used by the service (e.g. 25 =
SMTP, 80 = WWW etc.). The value0 (zero) means all ports (i.e. all communication with
the selected port).
Allow protocol statistics
Separate logging of the data for this service. In the graph or
in the report, it will be possible to separately display the volume of the date trans-
ferred only by this service (for details see the chapters
,
If this option is on, attribute S appears in the column Flags.
Do the detailed protocol analysis
Performs the detailed analysis of this service. This
option is available only for the standard services, where Kerio Network Monitor can
perform the analysis (HTTP, SMTP, POP3, IMAP4, FTP and DNS). The analysis results
(i.e. e.g. captured WWW pages, E-mail messages, transferred files, etc.) are displayed
to the Scanned data window, or possibly also to the appropriate log (HTTP Log, Mail
Log
, ICQ Log). Details are to be found in the chapters
and
.
If this option is on, attribute P appears in the column Flags.
Note:
To define other parameters for protocol analysis use the Others option. To see
their detailed description refer to chapter
Enable protocol debugger
Detailed log of data for this service for purposes of techni-
cal support. This option can be used if you suspect that Kerio Network Monitor does
not log the data of appropriate service correctly. Obtained data can be handed to
technical support of the Kerio Technologies for further analysis.
If this option is on, attribute D appears in the column Flags.
Do not delete the debug information
The detailed data of the service, stored for de-
bugging purposes (see the previous option), are rather large and could very quickly
fill in considerable amount of disk space. Therefore they are under normal conditions
deleted on each close of the monitored connection. By setting this option on, the data
will not be deleted automatically and will remain stored until manually deleted.
6.3 User Accounts
When the viewer is connecting to the Kerio Network Monitor Daemon service, the user
name and the password are required. It ensures that only the authorized users have