beautypg.com

PLANET CS-2001 User Manual

Page 7

background image

6

Chapter 21 Web VPN / SSL VPN .................................................................. 622

21.1 Example ..................................................................................... 626

IM Recording ........................................................................................ 641

Chapter 22 Configuration .............................................................................. 642

22.1 Example ..................................................................................... 644

Chapter 23 Reports ......................................................................................... 650

23.1 Statistics ..................................................................................... 657

23.2 Message History......................................................................... 659

Policy ...................................................................................................... 659

Chapter 24 Policy ............................................................................................ 660

24.1 Example ..................................................................................... 666

Anomaly Flow IP .................................................................................. 691

Chapter 25 Anomaly Flow IP ......................................................................... 692

25.1 Example ..................................................................................... 693

Advance .................................................................................................. 697

Chapter 26 Inbound Balancing ...................................................................... 698

26.1 Example ..................................................................................... 709

Chapter 27 High Availability ......................................................................... 742

27.1 Example ..................................................................................... 744

Chapter 28 Co-Defense System ...................................................................... 751

28.1 Example ..................................................................................... 754

Monitoring ............................................................................................. 759

Chapter 29 Logs .............................................................................................. 760

29.1 Traffic ......................................................................................... 768

29.2 Event .......................................................................................... 772

29.3 Connection ................................................................................. 774

29.4 Viruses ........................................................................................ 776

29.5 Application Blocking ................................................................. 780

29.6 Concurrent Sessions ................................................................... 782

29.7 Quota .......................................................................................... 785

29.8 Log Backup ................................................................................ 788

Chapter 30 Accounting Reports .................................................................... 791

30.1 Flow Analysis............................................................................. 797

30.2 Today’s Top Chart ...................................................................... 798

30.3 Historical Top Chart ................................................................... 805

Chapter 31 Traffic Grapher ........................................................................... 806

31.1 WAN Traffic ............................................................................... 808

31.2 Policy-Based Traffic .................................................................. 812