Planet CS-2001 User Manual page 7

Table of Contents

Advertisement

Chapter 21 Web VPN / SSL VPN .................................................................. 622
21.1 Example ..................................................................................... 626
IM Recording ........................................................................................ 641
Chapter 22 Configuration .............................................................................. 642
22.1 Example ..................................................................................... 644
Chapter 23 Reports ......................................................................................... 650
23.1 Statistics ..................................................................................... 657
23.2 Message History......................................................................... 659
Policy ...................................................................................................... 659
Chapter 24 Policy ............................................................................................ 660
24.1 Example ..................................................................................... 666
Anomaly Flow IP .................................................................................. 691
Chapter 25 Anomaly Flow IP ......................................................................... 692
25.1 Example ..................................................................................... 693
Advance .................................................................................................. 697
Chapter 26 Inbound Balancing ...................................................................... 698
26.1 Example ..................................................................................... 709
Chapter 27 High Availability ......................................................................... 742
27.1 Example ..................................................................................... 744
Chapter 28 Co-Defense System ...................................................................... 751
28.1 Example ..................................................................................... 754
Monitoring ............................................................................................. 759
Chapter 29 Logs .............................................................................................. 760
29.1 Traffic ......................................................................................... 768
29.2 Event .......................................................................................... 772
29.3 Connection ................................................................................. 774
29.4 Viruses ........................................................................................ 776
29.5 Application Blocking ................................................................. 780
29.6 Concurrent Sessions ................................................................... 782
29.7 Quota .......................................................................................... 785
29.8 Log Backup ................................................................................ 788
Chapter 30 Accounting Reports .................................................................... 791
30.1 Flow Analysis............................................................................. 797
30.2 Today's Top Chart ...................................................................... 798
30.3 Historical Top Chart ................................................................... 805
Chapter 31 Traffic Grapher ........................................................................... 806
31.1 WAN Traffic ............................................................................... 808
31.2 Policy-Based Traffic .................................................................. 812
6

Advertisement

Table of Contents
loading

Table of Contents