Raritan Computer COMMANDCENTER NOC User Manual
Page 10

x
F
IGURES
Figure 52 Add a New Network Route......................................................................................................... 41
Figure 53 Prune Unused Performance Data .............................................................................................. 41
Figure 54 Delete Management Settings and Data ..................................................................................... 42
Figure 55 Delete Traffic Analysis Performance Data ................................................................................. 43
Figure 56 Install a new License File........................................................................................................... 43
Figure 57 Installed Appliances List ............................................................................................................ 44
Figure 58 Ethernet TAP Deployment ......................................................................................................... 46
Figure 64 Selecting Signature Types ......................................................................................................... 51
Figure 65 Load Intrusion Detection Settings .............................................................................................. 52
Figure 66 Deleting Intrusion Detection Performance Data ......................................................................... 52
Figure 68 Generating New Signature Set .................................................................................................. 53
Figure 72 Specifying proxy host information .............................................................................................. 58
Figure 73 Specifying proxy host information .............................................................................................. 59
Figure 74 Specifying proxy authentication credentials ............................................................................... 60
Figure 75 List of Windows Management Proxies ....................................................................................... 61
Figure 77Selecting WINS Tab.................................................................................................................... 63
Figure 79 Manage Devices ........................................................................................................................ 64
Figure 81 Edit WINS Settings .................................................................................................................... 66
Figure 82 WINS Server IP Address ........................................................................................................... 66
Figure 84 Edit LMHOSTS File.................................................................................................................... 67
Figure 85 Vulnerability Scanning Warning ................................................................................................. 69
Figure 86 Type IP Addresses for Vulnerability Scanning ........................................................................... 71
Figure 87 Create a Vulnerability Scanning Schedule ................................................................................. 72
Figure 88 Notification Status ...................................................................................................................... 73
Figure 89 Admin Status ............................................................................................................................. 73
Figure 90 A Configuring Event Notifications............................................................................................... 74
Figure 91 Adding a New Event Notification................................................................................................ 75
Figure 93 Validating an Interface/Service Rule .......................................................................................... 77
Figure 94 Entering Notification Recipient Information ................................................................................ 77
Figure 96 Arranging Event Notifications..................................................................................................... 78
Figure 97 Configure Notification Groups .................................................................................................... 79
Figure 98 Assigning a Name to a Notification Group ................................................................................. 79
Figure 99 Assigning Users to a Notification Group .................................................................................... 80
Figure 100 Configuring a Notification Path................................................................................................. 81
Figure 101 Configuring a Notification Path................................................................................................. 82
Figure 102 Configuring a User Target in Notification Path ......................................................................... 82
Figure 103 Configuring a Group Target in Notification Path....................................................................... 83
Figure 104 Configuring an Email Target in Notification Path...................................................................... 83