21.1 Example ..................................................................................... 634
Policy ...................................................................................................... 649
Chapter 22 Policy ............................................................................................ 650
22.1 Example ..................................................................................... 657
Anomaly Flow IP .................................................................................. 682
23.1 Example ..................................................................................... 684
Advance .................................................................................................. 688
24.1 Example ..................................................................................... 700
25.1 Example ..................................................................................... 735
26.1 Example ..................................................................................... 745
Monitoring ............................................................................................. 750
Chapter 27 Logs .............................................................................................. 751
27.1 Traffic ......................................................................................... 759
27.2 Event .......................................................................................... 763
27.3 Connection ................................................................................. 765
27.4 Viruses ........................................................................................ 767
27.7 Quota .......................................................................................... 776
27.8 Log Backup ................................................................................ 779
28.1 Flow Analysis ............................................................................. 788
29.1 WAN Traffic ............................................................................... 799
30.1 Ping ............................................................................................ 808
30.2 Traceroute .................................................................................. 811
30.3 Packet Capture ........................................................................... 813
31.1 Example ..................................................................................... 815
Chapter 32 Status ............................................................................................ 816
6