21.1 Example ..................................................................................... 626
IM Recording ........................................................................................ 641
22.1 Example ..................................................................................... 644
Chapter 23 Reports ......................................................................................... 650
23.1 Statistics ..................................................................................... 657
Policy ...................................................................................................... 659
Chapter 24 Policy ............................................................................................ 660
24.1 Example ..................................................................................... 666
Anomaly Flow IP .................................................................................. 691
25.1 Example ..................................................................................... 693
Advance .................................................................................................. 697
26.1 Example ..................................................................................... 709
27.1 Example ..................................................................................... 744
28.1 Example ..................................................................................... 754
Monitoring ............................................................................................. 759
Chapter 29 Logs .............................................................................................. 760
29.1 Traffic ......................................................................................... 768
29.2 Event .......................................................................................... 772
29.3 Connection ................................................................................. 774
29.4 Viruses ........................................................................................ 776
29.7 Quota .......................................................................................... 785
29.8 Log Backup ................................................................................ 788
30.1 Flow Analysis............................................................................. 797
31.1 WAN Traffic ............................................................................... 808
6