Kerio Tech Computer Monitor Network Monitor User Manual

User’s Guide  
Kerio Technologies  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
1
2
3
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5  
Quick Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7  
Technical Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9  
3.1 Kerio Network Monitor Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9  
3.2 How does Kerio Network Monitor work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9  
3.3 Technical Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12  
4
5
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15  
4.1 Upgrade and Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16  
4.2 Importing the License Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16  
Program Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19  
5.1 Logging in the Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19  
5.2 Controlling the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20  
5.3 Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21  
6
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23  
6.1 IP Addresses Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23  
6.2 Monitored Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27  
6.3 User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29  
6.4 Log Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32  
6.5 Protocol Monitoring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34  
6.6 WWW Interface Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35  
6.7 Additional Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37  
7
Viewing and Analysis of Captured Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41  
7.1 List of Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42  
7.2 Traffic chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45  
7.3 Current Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46  
7.4 Tree of Scanned Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49  
7.5 Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51  
7.6 Transferred Data Volume Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53  
7.7 Log Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
8
Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59  
8.1 Connection to the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59  
8.2 Page Main . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60  
8.3 Page Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60  
8.4 Page Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60  
8.5 Page Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61  
8.6 Page Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61  
8.7 Integration of the WWW Interface into the Company Website . . . . . . . . . . 61  
9
Glossary of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67  
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69  
10  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Introduction  
Kerio Network Monitor is a small, though powerful tool for online monitoring of network  
traffic. It offers a whole set of choices which activities and events can be monitored.  
Line load chart The online display of the Internet connection load (incoming and out-  
going traffic) in the time range from 1 minute and 1 year. The average transfer speeds  
are shown for 3 seconds (1 minute graph) up to for 3 days intervals (for 1 year graph).  
Both the total traffic and the traffic for particular users (workstations in the network)  
can be displayed at once. This way, you can quickly find out the workstation gener-  
ating the biggest load on the Internet connection.  
By default, the traffic for all available services (e.g. WWW, FTP, TELNET etc.) is dis-  
played. Besides, the traffic for particular services (predefined or custom — deter-  
mined by a protocol and a port number) can be displayed and their traffic can be  
watched separately. The traffic is shown for particular IP addresses which can be  
translated into the names of computers (taken from DNS or entered manually).  
Total volume of data within a given time period From acquired data you can identi-  
fy, who in your network uses the Internet in the most intensive way. It is possible to  
create statistics with a day, week or month increments (e.g. the last 2 months with  
week increments for all or only some selected computers).  
Current connections It is possible to watch a in special window in (almost) real time,  
which connections have the particular stations opened. The history of those connec-  
tions is recorded in the (Connection Log).  
Tree of captured data Kerio Network Monitor is able to store detail data of certain pro-  
tocols (e.g. SMTP, POP3, IMAP, HTTP, etc.). The data is displayed as a neat tree, where  
it can be sorted according to the stations (IP addresses) or the protocols. Optionally,  
it is possible to store also the content of the sent E-mail and the visited WWW pages  
(if they are not transferred using encrypted protocols).  
Log of visited WWW pages The HTTP Log window records all the captured HTTP re-  
quests. The selection of a computer from the list is differentiated by color all request  
generated by this particular station.  
E-mail log Window Mail Log stores information about all E-mail messages; both sent via  
the SMTP protocol, as well as downloaded via the POP3 or the IMAP (if they were not  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1 Introduction  
transferred using encrypted connections). The sender address, the recipient address  
and the size of sent message are stored.  
ICQ log Use the ICQ Log dialog to view information on communication through ICQ  
and ICQ2Go protocols. ICQ numbers and nicknames of senders and recipients as  
well as message body are logged.  
Remote access Kerio Network Monitor has separated monitoring service (Daemon) and  
the user interface. These two components communicate together via the TCP/IP pro-  
tocol. It results in the possibility of watching and configuration not only locally but  
also remotely from any other computer.  
WWW access Kerio Network Monitor contains embedded WWW server, which enables  
viewing and evaluation of the data using a standard WWW browser. It offers major  
part of the functions, which are included in the user interface (with exception of the  
program configuration).  
User accounts When connecting to the service, user name and password are required.  
Therefore more users can be connected simultaneously to Kerio Network Monitor  
with different levels of the access rights (viewing, configuration, administration of  
the user accounts, ...).  
Export of data The data created by Kerio Network Monitor is possible to be further  
processed: the chart can be stored as an image, the statistics for particular time  
frame can be stored into the CSV format (can be processed by e.g. Microsoft Excel),  
the logs can be processed by an external analyzer (e.g. Kerio Log Analyzer).  
How can you use Kerio Network Monitor?  
you want to have an overview how individual computers in your firm put load on the  
Internet line  
you need a basis for charging particular users (computers) for the costs of the Inter-  
net connection.  
you require an audit of your employees’ Internet browsing  
you are interested in which WWW pages they visit, which files they download, who  
they send E-mail to...  
searching for and finding the solutions to your problems — Kerio Network Monitor  
offers you a lot of information about the history of the communication in your net-  
work.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Quick Checklist  
This chapter gives you a basic step-by-step guide to quickly set up the important param-  
eters of Kerio Network Monitor program so that it can be used immediately. If you are  
unsure about any of its steps, look up the chapter dealing with the appropriate prob-  
lems.  
1. Choose suitable computer in your network and install both components of Kerio  
Network Monitor on it (see chapters 4 and 3.3).  
2. Log in to the viewer (see chapter 5.1) and choose the adapters, on which the packets  
are to be monitored (see chapter 5.3).  
3. In the menu Action / Change password set the password for user Admin.  
4. If no private IP addresses are used in the local network set appropriate ranges of IP  
addresses in the menu Settings / Configuration, the IP addresses tab (see chapter 6.1).  
5. If the local network is connected to the Internet via a proxy server, check and, if nec-  
essary, adjust the settings for the proxy server in the menu Settings / Configuration,  
the IP addresses tab (see chapter 6.1).  
6. If an mail server is running in the local network or on the internet gateway, decide  
how the amount of transferred mail should be measured and perform the appro-  
priate settings the in menu Settings / Configuration, the IP addresses tab (see chap-  
ters 3.3 and 6.1).  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 Quick Checklist  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Technical Information  
3.1 Kerio Network Monitor Components  
Kerio Network Monitor consists of two separate components:  
Watching service (Daemon) The executive core of the program that captures the pack-  
ets and saves the data into a file on the disk. It runs as a service (in Windows  
NT/2000/XP) or as a background application (in Windows 9x/Me).  
Viewer It is intended for viewing and analyzing gathered data and configuration of  
the service. The communication between the viewer and the Daemon is kept using  
the protocols of the TCP/IP standard — thanks to this fact it is possible to connect  
not only from local (from the same computer) but also from any other computer in  
the local network respectively in the Internet. The detail description is located in  
chapter 5.1.  
3.2 How does Kerio Network Monitor work?  
Packet Monitoring  
Kerio Network Monitor Daemon watches the network traffic in so called promiscuous  
mode (i.e. it can accept also the data that isnot addressed to the computer on which it  
is running). It captures all the IP protocol packets from which it extracts the required  
information:  
Volume of transferred data  
In each captured IP packet test of the source and the  
target address is performed. If one of these addresses belongs to the local network  
and the other to the Internet (it deals with transfer between the local network and  
the Internet), the size of the data part of transport protocol (TCP or UDP) is measured  
and this figure is stored. In case that both addresses belong to the local network or  
to the Internet, size of the data is not stored.  
Program configuration defines if the IP addresses belong to the local network or to  
the Internet — see chapter 6.1.  
Note: Various network monitoring tools use different methods for measuring of the  
volume of transferred data (e.g. whole Ethernet frames, size of the data in IP packets  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Technical Information  
including headers, etc.). The information gathered by Kerio Network Monitor can  
therefore differ from those acquired by the other tools (the deviation should not  
excess 40% — if there is several times higher difference, it is necessary to look for the  
mistake in the network or in the program configuration).  
Viewing current connections All captured IP packets are scanned for TCP segments  
opening and closing connection (with attributes SYN and FIN). So Kerio Network Mon-  
itor has information about all open connections of individual workstations in the net-  
work. In similar way information about communication via UDP protocol is displayed.  
Because it is datagram-oriented protocol so called pseudo-connections are evaluated  
— connection lasts until interval of UDP datagram exchange between source and tar-  
get station exceed predefined time (default: 180 seconds).  
Monitoring of services Each of the captured IP packets is checked if it contains data  
from some of the defined services (see chapter 6.2). In positive case the data is stored.  
As an example, we present the transfer of E-mail via the SMTP protocol. If the TCP  
connection with the target port 25 is recorded, all packets belonging to this connec-  
tion are monitored and from them E-mail address of the sender and the recipient of  
the message, eventually the content of the message can be reconstructed.  
Configuration File  
Kerio Network Monitor configuration information is stored in the NetMon2.cfg file. This  
file is saved under the directory where Kerio Network Monitor is installed (typically  
C:\Program Files\Kerio\Network Monitor). Simply copy this file to backup your  
settings.  
Warning: Stop Kerio Network Monitor Daemon before taking any action with the config-  
uration file (refer to chapter 5.2)!  
Data Storage  
The measured data is stored in binary files on the disk. In the data folder (by default the  
same, where Kerio Network Monitor is installed), the following subfolders are created:  
high — data with high resolution (sampling rate 3 seconds)  
low — data with low resolution (sampling rate 1 hour)  
In these folders are created another subfolders according to the IP addresses of individ-  
ual computers in the local network and in them are stored the files with the acquired  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2 How does Kerio Network Monitor work?  
data (the high resolution data — one file per day, the low resolution data — one file per  
28 days).  
Then there are created the following subfolders:  
browse — the information about the captured objects of the monitored services  
(URLs of web pages, E-mail addresses, FTP relations, etc.)  
captured — captured objects (e.g. captured WWW pages, E-mail messages, etc.)  
logs — files with the logs (see chapter 7.7)  
debug — the data stored for detail monitoring of particular service (see chapter 6.2)  
The folder structure for storing the data is rather flexible because it enables e.g.  
merging of the data with other data (if it deals with two mutually exclusive time  
periods)  
deleting the logs for a particular computer (IP address)  
deleting the data of a particular service (e.g. WWW).  
Before performing operations of this type, it is necessary to stop Kerio Network Monitor  
Daemon (see chapter 5.2).  
Data Storage Folder Modification  
In case you need to change the folder for storing the measured and captured data and  
the log files (so that they are for example stored to the different disk), it is possible to  
carry it out by modifying appropriate parameter in the configuration file.  
First of all it is necessary to stop the Network Monitor Daemon service (see chapter 5.2).  
Then open in any editor (e.g. Notepad) the file NetMon2.cfg (the Configuration File  
section). The data folder is written in the main_dir parameter. For technical reasons  
the backslashes must be doubled in the path name — the path to the chosen data folder  
can look like this:  
main_dir = "d:\\netmon_data"  
The change of the data folder is best to perform immediately after the Kerio Network  
Monitor program installation, when there are not yet any measured real data. If you  
are changing the folder after some time of using the program, it is necessary to copy  
(respectively move) to the new location the folders with the acquired data and the logs,  
i.e. browse, captured, debug, high, logs, low a www.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Technical Information  
Warning: Subfolder license must remain in the same folder as the program files (i.e.  
where was Kerio Network Monitor originally installed)!  
After changing the folder and possible copying the measured data you can again run  
Network Monitor Daemon.  
3.3 Technical Limitations  
The principle how Kerio Network Monitor works implies some small limitations. They  
are to be kept in mind especially when choosing the computer for installation of Kerio  
Network Monitor  
Network Components and Network Topology  
If your network contains switch (switching hub), keep in mind that it does not send all  
the data to all its ports! But Kerio Network Monitor requires all the data to be present in  
the segment, which is “his”computer connected to.  
There are several solutions:  
install Kerio Network Monitor directly on the computer, which is connected to the  
Internet. This solution is recommended always when on the internet gateway runs  
Windows type operating system. (Kerio Network Monitor then must be set up for  
monitoring on the “inner” network adapters — see chapter 6.1).  
some types of switches can be configured so that they send all data to one (so called  
monitoring) port. The station, which Kerio Network Monitor Daemon runs on, can be  
connected to this port.  
insert small hub between the switch and the internet gateway (3 ports are enough —  
one for the switch, the second for the internet gateway and the third to the computer,  
where Kerio Network Monitor Daemon runs).  
If the network is divided by the router to more IP segments Kerio Network Monitor Dae-  
mon must be installed on computer in the same segment as the internet gateway.  
If the network has more segments and each of them is connected directly to the internet  
gateway Kerio Network Monitor must be installed directly on the gateway. In the other  
case it will monitor only the data in the segment which it is connected to.  
E-mail  
The natural requirement of the network administrator is also to monitor the volume of  
the data transferred via electronic mail (E-mail) and accepted by the local mail server.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3 Technical Limitations  
The most common case is the situation when the mail server runs on the computer that  
is also the internet gateway. Kerio Network Monitor then “sees” only the local communi-  
cation of the clients with the mail server. In the default configuration of Kerio Network  
Monitor are created rules, which consider this communication to be the Internet com-  
munication (so that the volume of the data is measured. It is necessary to keep in mind  
that the volume of the date is measured also when the users are sending mail locally to  
each other.  
If the mail server runs on another (“inner”) computer, Kerio Network Monitor records E-  
mail communication outside of the local network twice: when the client communicates  
with the mail server in the Internet. Then it is useful to change predefined rules for the  
SMTP, POP3 and IMAP services so that the rules are valid only for IP address of the mail  
server — e.g.:  
<192.168.1.10> <255.255.255.255> TCP25 on Internet  
and add the rules for ignoring any other mail communication — e.g.:  
<all addresses> <all addresses> TCP25 discard packet  
These rules must be in the list of the rules lower than the rules for particular mail server.  
Detail description can be found in chapter 6.1  
Proxy Server  
Similarly as in the case of the mail server located on the computer, which is the internet  
gateway, raises the problem with monitoring the communication of the clients with the  
proxy server, when the data is taken from its case — also this data will be evaluated as  
downloaded from the Internet.  
This problem can be avoided only by switching of the cache, which can be unpleasant  
under some conditions.  
Encrypted Connection  
Data encrypted by any protocol cannot be analyzed by Kerio Network Monitor. Only size  
of transferred data can be monitored in such cases.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Technical Information  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4  
Installation  
Kerio Network Monitor can be installed on any computer in your local network running  
Windows 95 OSR2, 98, Me, NT 4.0, 2000 or XP operating system. Older versions are not  
supported.  
Installation is performed by running the installation archive e.g.:  
kerio-netmon-2.10-en-win.exe  
During the installation, the user can choose, which components of Kerio Network Monitor  
are to be installed:  
NetMon Daemon Monitoring service (Daemon). It must be installed on the computer,  
where you want to monitor the communication (typically e.g. on the Internet gate-  
way).  
Note: License conditions allow to install the monitoring service only on one computer.  
If you want perform monitoring in more places, appropriate number of Kerio Network  
Monitor licenses must be purchased.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Installation  
NetMon Application Viewer. It can be installed on any number of computers, where  
you will connect to the service from.  
Note: We recommend to install the viewer also on the computer, where will be the  
monitoring service (Daemon) installed (to allow local connection in case of any prob-  
lems with the network; in the case of Windows 9x/Me it is the only way how to stop  
and start the service — see chapter 5.2).  
The Daemon is started automatically (there is no need to restart the computer) after  
installation. From now on it is possible to log in to the viewer (see chapter 5.1).  
4.1 Upgrade and Uninstallation  
If you would like to upgrade Kerio Network Monitor or uninstall the program, you must  
stop the viewer. Kerio Network Monitor Daemon does not have to be stopped manually,  
because the installation program will stop it automatically.  
To perform the upgrade procedure run the installation program (can be obtained e.g.  
from the Internet pages of its producer — www.kerio.com). The original version needn’t  
to be uninstalled. The installation program automatically detects the folder of previous  
version and installs in it. After successful upgrade the Kerio Network Monitor Daemon  
is started automatically.  
Uninstallation of Kerio Network Monitor can be performed by choosing the Add / Remove  
Software option in the Control Panels. When uninstalling, the folders and files within,  
in which the scanned data is stored, are not deleted. They must be removed manually  
(or can be used for the next installation of Kerio Network Monitor, moved to another  
computer, etc.).  
Note: If you will forget to stop the viewer or the installation program will be unable to  
stop the service, the installation program will require reboot of the computer.  
4.2 Importing the License Key  
Kerio Network Monitor behaves after installation as fully functional demo version with  
time limitation to 15 days from the installation day. On expiration of the time, the  
program will stop collecting the data.  
On purchase of the product, you will receive the license key — file with the digital cer-  
tificate license.key. By importing the key, Kerio Network Monitor becomes full version  
instead of demo version, and the program can be used on for unlimited time. This pro-  
cedure can be preformed also after the 15 day trial period has expired and the program  
is not functional. After importing the valid license key, it will work again in full extent.  
Import of the license key is performed in the menu About / About.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.2 Importing the License Key  
Pressing the button Import license displays a dialog for opening the file with the license  
(license.key). When it is loaded successfully, the information about current license  
will appear in the section License information:  
ID Identifier of the license (serves e.g. for verification of the license authenticity)  
Holder Holder of the license — individual or organization, which bought the product.  
Number of users The number of users (i.e. IP addresses of the computers in the local  
network, which will be monitored). If this number is reached the next IP addresses  
are not monitored and on the start of the viewer a warning, saying that the maximum  
number of users was reached, is displayed.  
Subscription expiration Free program upgrade expiration date.  
License expiration License validity expiration date (applicable for demo versions and  
time restricted version)  
License state License state: Valid or Invalid. License is invalid if the date of its expira-  
tion occurred or the license file was corrupted, etc.  
Note: If the license is invalid Kerio Network Monitor does not measure any data. It is  
still possible to log in the viewer and browse older data (measured in the time, when  
the license was valid), or perform configuration tasks. By importing a valid license  
(see above), the program functions will be restored in full extent.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Installation  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5  
Program Control  
5.1 Logging in the Viewer  
The viewer can be started by choosing Programs Kerio Network Monitor in the  
menu Start. The login dialog is shown after the program is started .  
In the section Login to choose, where the Kerio Network Monitor Daemon service is run-  
ning:  
local NetMon service Daemon The service is running on the same computer as the  
viewer.  
remote service on T he service is running on another (remote) computer.  
Insert IP address or DNS name of the host on which the service is running (the term  
“server” will be used in the further text), or select any server to which Kerio Network  
Monitor has been already connected. Kerio Network Monitor keeps names (or IP ad-  
dresses) of all servers to which it has been connected successfully, including their  
usernames. Failed connection attempts are not kept. Passwords are not stored for  
security reasons.  
Note: By entering the name localhost or the loopback address 127.0.0.1, you will  
get the same effect as by choosing local NetMon service Daemon — connection to the  
service running on the local computer.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Program Control  
User authentication — enter your user name and password. In case you are logging  
to Kerio Network Monitor for the first time (after installation), use the predefined user  
account Admin and leave the password empty. To store passwords in user profiles so  
that it is not necessary to specify them for each connection use the Store password in  
user profile option.  
You can perform the login by pressing the button Login. The button Cancel cancels the  
login dialog and also closes the viewer. The More >> button expands the dialog by other  
options. When pressed, it changes to Less << — it allows the expanded options to be  
hidden.  
Store password in user profile User name and password will be stored into the user  
profile in Windows and it will not be necessary to enter it on each login. We recom-  
mend to use this option only when there is no risk of access rights misuse by another  
person!  
Don’t restore windows settings The viewer will not restore the layout of the individ-  
ual windows. This can be helpful e.g. when connecting remotely via slow line(it can  
significantly decrease the amount of transferred data), or in case that more people  
uses the same user account.  
5.2 Controlling the Service  
After pressing the More >> button in the login dialog, the icon for configuration of the  
service will appear in the lower right corner of the window. On clicking it, the following  
dialog will appear:  
Daemon status Display the status of the service — (Running) or (Stopped).  
KNM system service status Shows, if the Kerio Network Monitor Daemon is installed  
as a system service Installed (SVC) — in Windows NT/2000/XP), as background appli-  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3 Initial Configuration  
cation (Installed (APP) — in Windows 9x/Me) or is not installed as service (Not installed  
(SVC)).  
Start Runs the service (if stopped).  
Reinitialize the service Reinitialization of the service (de facto stopping and rerun-  
ning) — only when the service is already running.  
Stop Stops the service (if running).  
Install as system service Creates the Kerio Network Monitor service, if it already does  
not exist (in Windows NT/2000/XP as system service, in Windows 9x/Me as back-  
ground application).  
Remove the KNM service Removes the Kerio Network Monitor system service. The ser-  
vice can be removed only when the service exists in the system and is stopped.  
Warning: If the Kerio Network Monitor Daemon is installed as the service in the operating  
system Windows NT/2000/XP, it is possible to start, stop and restart the service also  
using the system Control Panel Services.  
5.3 Initial Configuration  
If you login to the viewer for the first time (after installation of Kerio Network Monitor),  
a special dialog for selection of the adapters, on which the packets will be monitored, is  
displayed..  
Check the checkbox in front of all of the adapters you want to monitor. Usually it  
should include all the adapters connected to the local network. There is usually no use  
of monitoring the packets on the adapter connected to the Internet  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Program Control  
if the network address translation is used (NAT), we can see only the address of the  
computer, which Kerio Network Monitor is running on.  
By pressing the Done button, the settings will be stored and the viewer itself will start.  
This dialog will not be displayed on any other login. The settings can be, of course,  
modified in the program.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6  
Configuration  
All settings of Kerio Network Monitor are done in the Configuration window, which can  
be accessed by choosing Settings / Configuration in the main menu or by pressing the  
Ctrl+S shortcut.  
Note: All settings in the Configuration dialog have immediate effect (after pressing the  
OK button). In any case there is no need to restart the Kerio Network Monitor Daemon  
service.  
6.1 IP Addresses Ranges  
The IP Addresses tab allows the user to choose network interface, which will be the  
packet captured on. It also allows definition of IP addresses range, which they will be  
logged within.  
Capture packets from interfaces Usually, it should include all the adapters connected  
to the local network. There is usually no use of monitoring the packets on the adapter  
connected to the Internet — if the network address translation is used (NAT), we can  
see only the address of the computer, which the Kerio Network Monitor is running  
on.  
List of IP addresses groups List of individual groups of IP addresses with the group  
type (on LAN, on Internet or discard packet). Detailed description is later in this  
document.  
All other addresses This option specifies a group, which includes all IP addresses,  
which do not comply with any of the introduced specifications.  
Typical usage example: we specify addresses belonging to the local network and  
using this option we set that “all other addresses belong to the Internet ” (are on  
Internet).  
Add, Edit, Remove These buttons are used for adding new group of addresses, respec-  
tively for modification or deleting of the selected group.  
Arrow buttons (up / down) The list of IP addresses definitions is always traversed  
from up to bottom. Therefore the definitions must be ordered from the most specific  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
to the most general. The arrow buttons are used for moving the selected definition  
up or down in the list.  
Definition of IP Addresses Group  
After pressing the Add or Edit button the dialog for IP addresses group definition will  
appear.  
IP range specification Type of the group. One of the following types can be chosen:  
Host — IP address of a particular computer  
Subnet: IP address / mask — IP subnet with appropriate mask.  
IP addresses & masks of the local interfaces — all IP addresses of the network,  
which are connected to the adapters selected for packets monitoring, will be added  
to the group.  
All addresses — all IP addresses  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.1 IP Addresses Ranges  
Domain type specification Type (domain) of IP addresses group. This option defines,  
how will the packets, whose source and target address belong to this group, be pro-  
cessed. The group of addresses can be included in one of the following domains:  
LAN — local network. The specific property of this group is that all captured  
addresses from this group are added to the list of computers (see chapter 7.1).  
Internet — addresses from this group are measured but no list is created from  
them.  
discard data  
if source or target address belongs to this group, the volume of the data in this  
packet will not be counted.  
Note: The volume of the data in the packet will be measured only when one of the  
addresses (source or target) in the packet header belongs to the group LAN and the  
other to the group Internet. Details are to be found in the chapter 3.2.  
The rule above is valid for  
Specification of the protocol and the port, which is this  
rule valid for. This way it is possible to define e.g. that only data for particular service  
will be measured.  
All protocols — the rule will be valid for all protocols (and therefore also for all  
services)  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
TCP protocol with port — the rule will be valid only for the TCP protocol and the  
given port. The protocol and the port define particular service (e.g. SMTP, WWW,  
etc.) The port number 0 (zero) means all ports — so all services using the TCP  
protocol.  
UDP protocol with port — the rule will be valid only for the UDP protocol and the  
given port. The similar considerations are valid as in the case of the TCP protocol.  
Note  
After installation of Kerio Network Monitor, there are some predefined groups of ad-  
dresses in the IP Addresses tab. They are intended to maximally simplify the program  
configuration — so that it should be usable with the default settings in the highest pos-  
sible number of standard situations,  
Rules for all addresses (<all addresses>) with specified protocols and ports. These  
rules specify the services, which are running in the local network but should be mon-  
itored as the Internet ones (typically the proxy server and the mail server)  
If your network is connected to the Internet via proxy server, the rule for the proxy  
server should be defined (otherwise no data will be measured because the communi-  
cation between the client and the proxy server takes place only in the local network).  
The default rule supposes the standard port 3128 (TCP3128). If the proxy server in  
your network is running on another port (e.g. 80 or 8080), correct the port number  
in this rule.  
If the mail server is running on the computer, which is also the Internet gateway, then  
Kerio Network Monitor can not measure the volume of sent and received mail, because  
it is communication within the local network. For this reason there are predefined  
rules for the SMTP (TCP25), POP3 (TCP110) and IMAP (TCP143) protocols.  
Rules for private ranges of IP addresses (10.0.0.0, 172.16.0.0 and 192.168.0.0).  
These addresses are reserved for private network and can not appear anywhere in  
the Internet, therefore Kerio Network Monitor automatically supposes, that it deals  
with local network.  
Rule for adapters, which are the packets captured on (<used interfaces>).  
As it was already described earlier (see chapter 5.3), the packets should be monitored  
on the interfaces connected to the local network (so that Kerio Network Monitor could  
detect IP addresses of individual computers in the network). Therefore it is supposed  
that the adapters, which were chosen for packets monitoring, are connected to the  
local network (domain LAN).  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.2 Monitored Services  
If your network is not created from cascading segments (e.g. more subnets intercon-  
nected by routers), you have not to define any other rule for IP addresses.  
All the predefined rules can be modified or deleted if they do not meet the particular  
configuration. Usually it is not necessary — if there are e.g. in the local network used  
only the IP addresses from the range 192.168.0.0, the rules for other private ranges  
(10.0.0.0 and 172.16.0.0) are not efficient, because those addresses Kerio Network  
Monitor never captures. Similar consideration is valid also for the mail and the proxy  
server.  
6.2 Monitored Services  
Kerio Network Monitor allows to define network services, which will be monitored in  
detail. For this purpose serves the Services tab in the configuration dialog.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
List of services The window shows the list of the defined services (in the default set-  
tings, there is already predefined the majority of the standard services). The columns  
of the list have the following meaning:  
Service — name of the service (given by its definition)  
Protocol — protocol, which the service uses (TCP, UDP, ICMP, PPTP or any— All)  
Port / Subprotocol — port, which is used by the service (only for the TCP and UDP  
protocols)  
Flags (flags) — indication of other parameters, which were set for the service.  
Details see later.  
The buttons under the list of the services allow definition of new service (Add), modifi-  
cation of the service settings (Edit) or deleting of the service (Remove).  
The arrow buttons (up / down) serve for ordering the services in the list. This order is  
important only for better orientation; it has no influence to the function of the program.  
Note: With some of the predefined services (HTTP, SMTP, POP3, IMAP4, FTP and DNS)  
are connected some other functions of Kerio Network Monitor, and therefore they can  
not be removed.  
Service Definition  
After pressing the Add or Edit button, the dialog for service definition will be shown:  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.3 User Accounts  
All traffic of ... protocol type Protocol, which is used by the given service. The pos-  
sibilities are: TCP, UDP, ICMP (Internet Control Messages Protocol), PPTP (Point to  
Point Tunneling Protocol ) and All (any protocol — i.e. whole IP communication).  
with port / subprotocol number Port number, which is used by the service (e.g. 25 =  
SMTP, 80 = WWW etc.). The value0 (zero) means all ports (i.e. all communication with  
the selected port).  
Allow protocol statistics Separate logging of the data for this service. In the graph or  
in the report, it will be possible to separately display the volume of the date trans-  
ferred only by this service (for details see the chapters 7.2, 7.6).  
If this option is on, attribute S appears in the column Flags.  
Do the detailed protocol analysis Performs the detailed analysis of this service. This  
option is available only for the standard services, where Kerio Network Monitor can  
perform the analysis (HTTP, SMTP, POP3, IMAP4, FTP and DNS). The analysis results  
(i.e. e.g. captured WWW pages, E-mail messages, transferred files, etc.) are displayed  
to the Scanned data window, or possibly also to the appropriate log (HTTP Log, Mail  
Log, ICQ Log). Details are to be found in the chapters 7.4 and 7.7.  
If this option is on, attribute P appears in the column Flags.  
Note: To define other parameters for protocol analysis use the Others option. To see  
their detailed description refer to chapter 6.7.  
Enable protocol debugger Detailed log of data for this service for purposes of techni-  
cal support. This option can be used if you suspect that Kerio Network Monitor does  
not log the data of appropriate service correctly. Obtained data can be handed to  
technical support of the Kerio Technologies for further analysis.  
If this option is on, attribute D appears in the column Flags.  
Do not delete the debug information The detailed data of the service, stored for de-  
bugging purposes (see the previous option), are rather large and could very quickly  
fill in considerable amount of disk space. Therefore they are under normal conditions  
deleted on each close of the monitored connection. By setting this option on, the data  
will not be deleted automatically and will remain stored until manually deleted.  
6.3 User Accounts  
When the viewer is connecting to the Kerio Network Monitor Daemon service, the user  
name and the password are required. It ensures that only the authorized users have  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
access to the data and the program configuration and no data breach or its intentional  
falsification by changing the configuration, should appear.  
Any number of user accounts with different levels of access rights can be defined in  
Kerio Network Monitor. There is a tab Users for this purpose in the configuration dialog  
(this tab can be also opened using the Settings / Users) menu.  
The list of users in this tab includes the following information:  
Username User name (which the user logs in with)  
Rights Access rights of the user (for details see bellow)  
Enabled Account state: enabled (yes) or blocked (no)  
The buttons under the list of the accounts allow definition of new user (Add), modifica-  
tion of settings for the selected account (Edit) or deleting the account (Remove).  
Note: The predefined user account Admin can not be removed, assigned access rights or  
disabled.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.3 User Accounts  
User Definition  
The dialog for definition of the user account will be shown after pressing the Add or Edit  
buttons .  
Username Name of the user. It should not contain blanks and punctuation marks.  
Small and capital letters are not distinguished.  
Password The user password. Can contain any printable characters (including spaces);  
distinguishes capital and small letters.  
Password again Verification of the password (to check that no mistakes occurred when  
entering the password)  
Warning: For security purposes, it is recommended not to leave the password empty!  
Also the password of the predefined user Admin should be changed after the first logon.  
Account is disabled It is possible to temporarily deactivate (“turn off”) the user ac-  
count by setting this option on.  
If this option is on value NO apppears in the column Enabled in the list of the users ,  
in the other case the value is yes.  
Can manage users The user is allowed to create, modify and delete the user accounts.  
This option also activates the option Can configure the service and in the column  
Rights in the list of the users is displayed as ManUsers (resp. Conf ManUsers).  
Can configure the service The user can perform the configuration of the Kerio Net-  
work Monitor Daemonservice(i.e. all settings in the dialog Configuration with excep-  
tion of the Users tab).  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
This right is in the column Rights in the list of the users shown as Conf .  
Change own password The user has the right to modify his own password (in the  
menu Action / Change password). If the option Can manage users is on, turning  
the option on or off has no effect.  
This right is not shown in the column Rights in the list of the users.  
6.4 Log Settings  
The Database tab is intended for setting the parameters for storing the acquired data.  
Statistics keeping time The maximum time which will be the statistics — the volume  
of transferred data in total and for particular defined services — kept for. The optimal  
setting depends both on the requirement how long should be the measured data  
stored, as well as on the size of available disk space and on the intensity of the  
network traffic (during the time of no communication, nothing is stored).  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4 Log Settings  
The time for keeping of the data is determined by the two following parameters:  
Data for the high resolution — data with the high resolution (3 seconds sampling  
rate). The time for keeping is given in weeks. This data represents the majority of  
the stored data.  
Low resolution data — data with low resolution (1 hour sampling rate). This data  
occupies much less space than the data with high resolution but its accuracy is  
sufficient for observing longer time period (e.g. 1 week and more).  
Thanks to their small size, the data with small resolution can be kept for longer  
time — time is given in months.  
Log keeping time Time of storing (respectively maximum age) of the log files Error  
Log, Connection Log, HTTP Log, Mail Log and ICQ Log. Given in  
days.  
Captured objects maximal age Time for storing of the captures objects (i.e. informa-  
tion, which is displayed in the window Scanned data — see chapter 7.4). Given in  
days.  
Keep captured WWW pages — time for storing the captured WWW pages. WWW  
pages can contain big amount of graphics and other objects, therefore it deals  
with high volume data.  
Keep captured FTP sessions — time for storing the information about connections  
to the FTP servers. Only information about the relations is stored (server, user,  
downloaded or uploaded files), not the transferred files. The volume of the data  
is therefore small.  
Keep captured e-mails — time for storing the captured E-mail messages. The  
messages are stored also with the attachment and can therefore represent high  
amount of data.  
Daily cleaning should be started at Startup time for automatic database maintenance  
(performed once a day). The main goal of this action is to remove the data, which is  
older than the set values (see the options described above).  
This maintenance can take a long time (in the worst case even several tens of minutes  
— depends on the size of the stored data and speed of the used computer). During  
the maintenance time it is not possible to view the currently processed log (in the  
appropriate window a message saying the maintenance is running, will appear). For  
this reason, the maintenance should be scheduled to the time, when there is low or  
even no traffic in the network (e.g. during the night).  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
Note: If the computer with Kerio Network Monitor is turned off in the given time,  
maintenance will be performed on the next start of the Kerio Network Monitor Dae-  
mon service.  
(Last cleaning took ... seconds) The time which took the last database maintenance  
(in seconds).  
6.5 Protocol Monitoring Parameters  
The Timeouts tab serves for setting the time parameters of the individual protocols:  
UDP & ICMP connection timeouts The UDP and ICMP protocols are datagram oriented  
— communication is based on the exchange of individual messages (so called data-  
grams) among that exists (at the level of the network communication) no connection.  
The typical communication consists of one or several sequences request — response.  
Therefore we can suppose there is regular exchange of datagrams in small intervals,  
in fact it makes one relation (so called pseudorelation). If the interval is noticeably  
higher, we suppose new relation was started. This principle can be used for show-  
ing the UDP and the ICMP pseudorelations in the Current connections window (see  
chapter 7.3).  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.6 WWW Interface Parameters  
The ICMP protocol and UDP protocol options are used for setting the above described  
intervals .  
TCP connection timeout The TCP protocol is relation based (first the relation, which  
the data is transferred in, is created). In this case we know exactly the time of creating  
and dropping the connection. If a small amount of data is transferred using a fast  
line the connection can last only a small time (often less than 1 second). In order  
to enable the user to watch the connection in the window Current connections (see  
chapter 7.3), it is left displayed for some time after the end of the connection. This  
time is set by the Closed TCP connections are kept displayed for option.  
6.6 WWW Interface Parameters  
The WWW tab serves for setting the parameters of Kerio Network Monitor WWW inter-  
face.  
WWW server enabled at port This option enables/disables the embedded WWW server.  
If set off, WWW interface is not available.  
Here is also specified the port, which is the WWW server running on (default 81). If  
there is no other WWW server running on the computer where Kerio Network Monitor  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
Daemon is installed, it is possible to use the standard port 80 — then it will be no  
longer necessary to specify the port in the browser, when connecting to the WWW  
interface of Kerio NetworkMonitor.  
Accept ’X-Forwarded-for’ tag... This option enables the Kerio Network Monitor to get  
the IP addresses of the client computers from the X-Forwarded-for tag in the HTTP  
request, which was accepted by the embedded WWW server from the proxy server.  
Set this option in case that local computers use a proxy server for the Internet ac-  
cess. In this configuration Kerio Network Monitor “sees” only the requests from the  
proxy server. In the X-Forwarded-for tag (which is added by the proxy server), it is  
possible to find the IP address of the client — the real originator of the HTTP request.  
Enter the IP address of the proxy server, which should Kerio Network Monitor accept  
the X-Forwarded-for tag from (it can not be accepted from any proxy server, be-  
cause this feature could be misused by the clients easily) to the appropriate field.  
If the proxy server is running on the same computer as the Kerio Network Monitor  
Daemon, use the loopback address 127.0.0.1.  
The above described problem can be solved by setting the WWW browser so that  
it does not use the proxy server for local address (but this option can usually be  
changed by the users).  
The following options define the behavior of the WWW interface if it is opened by the  
anonymous user (i.e. is not logged in with the user name and the password — see  
chapter 8.1).  
The default setting supposes that each user can view only information about his own  
computer (that, which is he connected to the WWW interface from). If the user has  
appropriate access rights to Kerio Network Monitor (i.e. has created the user account —  
see chapter 6.3), he can log in and see all the information, which Kerio Network Monitor  
offers.  
Show ’All computers’ item The option All computers will be shown in the list of the  
computers (i.e. show the statistics for all of the computers, logged by Kerio Network  
Monitor).  
Groups visible Option determining, which groups can be seen by anonymous users (No  
groups visible — no groups, Groups I’m in — only the group, which the computer, that  
is connected to the interface, belongs to or All groups — all groups).  
Computers visible This option determines, which computers can be seen (No comput-  
ers — no computers, Only my computer — only the computer, which he is connected  
from or All computers—all computers).  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.7 Additional Settings  
Log access rights Access rights to the logs (No logs access at all — no logs, My own  
logs only — only logs for the computer which he is connected from or All monitored  
stations — logs for all registered computers).  
Access rights to current connections Access rights for monitoring the current con-  
nections (No access to current connections at all — no connections, Current connec-  
tions of my computer only — only the connections for the computer, which is he  
connected from or All connections are visible — connections for all registered com-  
puters).  
6.7 Additional Settings  
Settingthe additional options for appearance and behavior of Kerio Network Monitor can  
be done on the Others tab.  
Do NOT save mail message body Kerio Network Monitor will not store the contents of  
captured E-mail messages (only the sender and the recipient address are stored).  
Note: Monitored and stored can be only messages, which are not transferred using  
encrypted protocols (in the other case only amount of transferred data can be mea-  
sured).  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
Warning: Keep in mind that monitoring the contents of E-mail violates user privacy!  
If this option is not enabled, all the users should be informed that theirs mail is  
monitored!  
ICQ privacy Use this option to define how communication through ICQ and ICQ2Go  
protocols will be monitored:  
No privacy — all transferred data will be monitored (ICQ numbers, nicknames,  
message bodies)  
Do not save text of messages Kerio Network Monitor will not store content of  
individual messages (only ICQ numbers and nicknames will be monitored)  
Disable ICQ analysator — data transferred through ICQ and ICQ2Go will not be  
analysed.  
Note: This can be also done by disabling detailed protocol analysis in ICQ defini-  
tion (see chapter 6.2). This implies that monitoring is enabled only if either the  
No privacy or the Do not save text of messages is used and if detailed protocol  
analysis is not enabled in ICQ configuration.  
Do NOT save tapped HTTP data Kerio Network Monitor will not store the content of  
the captured WWW pages. Enabling this option can radically save disk space of the  
computer. The option HTTP will not be available in the Tapped data window(it will  
not be possible to view pages visited by individual users).  
Note: Monitored and stored can be only pages, which are not transferred using en-  
crypted protocol HTTPS (in the other case it is possible only to measure the volume  
of the transferred data).  
Do NOT log HTTP requests for images... When opening the WWW pages in the brows-  
er, an HTTP request must be send for each object contained in the page (picture,  
script, etc.). In the HTTP Log are by default logged all the HTTP requests. Enabling  
this option makes only the pages themselves to be logged — HTTP Log will be much  
shorter and easier to read. Such HTTP log is sufficient enough in the majority of  
cases.  
Note: The log of requests to window / file HTTP Log can be done only if the commu-  
nication is via the HTTP protocol. In case of the encrypted HTTPS protocol only the  
volume of transferred data is logged.  
Include IP packet headers... Enabling this option causes the total size of transferred  
data to be counted from whole IP packets including the headers. Its use depends on  
the data you want to get.  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.7 Additional Settings  
Note: If you want to compare data acquired by Kerio Network Monitor with data from  
other programs or with the data from the Internet provider, it is necessary to find  
out, which methods are used for getting them and set the option Include IP packet  
headers of Kerio Network Monitor in accordance.  
Daemon process priority class Kerio Network Monitor priority definition. The  
high priority is set by the default. We recommend you to change this status under  
the following conditions only:  
the service overloads the system — set lower process priority  
Note: This solution is temporary only — we recommend you to use more powerful  
hardware.  
packet loss is often reported in the Error Log for lack of system capacity (refer to  
chapter 7.7) — set higher process priority  
Show NetMon in This option defines how should the Kerio Network Monitor be repre-  
sented: Taskbar only , System tray only or Both taskbar and system tray (both places).  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 Configuration  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7  
Viewing and Analysis of Captured Data  
Kerio Network Monitor offers several tools for the presentation and analysis of the cap-  
tured data. These functions can be chosen from the View menu or directly from a toolbar  
icon (the order of the functions is the same):  
Traffic chart Chart of the transferred data volume. You can display a transferred data  
for the chosen time interval in several graphical representations. The incoming and  
outgoing data, the particular computers, groups etc. can be watched separately.  
Current connections Displays current connections from particular computers. The  
window content is periodically refreshed.  
Scanned data Displays the logged data from specific protocols (WWW pages, e-mail  
messages, FTP sessions etc.)  
Status window Status of the Kerio Network Monitor Daemon service (logged user,  
statistics of captured packets, disk volume occupied by the stored data...)  
Report Creates a well-structured table from the transferred volume of data according  
to the specified parameters (time period, type of operation, level of details...)  
Connection log Displays the log of connections from particular computers (history of  
the Current connections window)  
HTTP log Log of requests from particular computers to WWW pages, or to all HTTP  
objects, respectively. (see chapter 6.7)  
Mail log Log of the captured e-mail messages (e-mail address of a sender and recipient,  
subject, and message size)  
ICQ log Log of ICQ messages (ICQ numbers, user nicknames and message contents)  
Error log Log of errors and warnings. The Kerio Network Monitor administrator should  
study this log regularly and try to eliminate detected errors and problems.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
KNM access log Log of information on users connecting into the application and on  
access to the Web interface. Each row includes a corresponding date, time and infor-  
mation on the following issues:  
user’s login (username and DNS name or IP address of the host from which he/she  
connects)  
Note: Failed login attempts are also logged — for example, you may find a log  
informing that an unauthorized person tried to connect.  
demand on the Web interface page (DNS name or IP address of the client, user-  
name, HTTP method and URL of demanded Web page)  
All the functions described above behave in the following manner:  
If the relevant window is not open, then the window is displayed after the icon is  
clicked (or after the menu item is selected).  
If the relevant window is already open, then it is activated and moved to the front.  
If you select the function while you simultaneously press the Shift key, the new win-  
dow for this function is displayed.  
Hint: The third described way can be used to open vertically or horizontally arranged  
charts for the incoming and outgoing traffic.  
7.1 List of Computers  
Left column of the main Kerio Network Monitor window shows the list of particular  
computers in a local network. The list is created automatically from the data of the  
captured packets. The computer is included in this list if the following conditions are  
met:  
IP address of the computer belongs to the group LAN (see chapter 6.1)  
Kerio Network Monitor has already logged at least one packet with the header con-  
taining this IP address (as a source or target address) — in this way, it learns that a  
computer with this IP address exists.  
If possible, the detected IP address is translated to a computer name (using reverse DNS  
query) and the name is displayed. In the other case, the directly detected IP address will  
be shown in the list of computers.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.1 List of Computers  
Use of List of Computers  
The list of computers is important for presentation of chart (see chapter 7.2) and table  
of transferred data volume (see chapter 7.6) presentation. These functions can display  
data either for all computers in a local network (All computers) or for only the selected  
computer (computers, respectively). Computers in the list can be arranged to groups  
(see later). One computer can act as a member of more groups.  
A computer/computers can be selected by mouse click. Several computers (and/or  
groups) can be selected with the Shift key pressed simultaneously. A circular field beside  
a computer name (or a group) shows, whether it was selected or not.  
A sufficiently contrast color (as compared to the chart background or to the other, al-  
ready applied colors) will be assigned to the selected computers. This color will be used  
to separately show values for the selected group of computers in the chart.  
Management of List of Computers  
The user can right-click to the list of computers, or directly to the selected computer or  
group, respectively. The menu with functions for the list of computers will be displayed.  
Rename Renames the selected groups or computers. This function is reasonably espe-  
cially for computers — the automatically detected name does not have to be descrip-  
tive enough or known at all (there is an IP address displayed in the list).  
Remove from group Removes the selected computer from the group, which it belongs  
to.  
Forget the computer Deletes the selected computer from the list. This function can be  
helpful, e.g., when the computer is permanently disconnected from a network, or the  
IP address was changed.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Note: If the packet with the same IP address is detected anytime afterwards, the  
computer will be automatically included again.  
New group Creates a new group. The dialog for a creation or a change of a group  
contains the following parameters:  
Group name — name of the group. It should be sufficiently descriptive (i.e. it  
should reflect, in general, the type of computers that will be included in this  
group).  
Add newly recognized computers — when this option is checked, all new detected  
computers (IP addresses) from a specified subnet will be automatically added to  
this group. Enter the requested subnet with the appropriate mask.  
Note: This option can be checked for several groups simultaneously, even for the  
same subnet.  
Remove the group Remove the selected groups from the list. This option does not  
delete the computers which belong to the group, it only cancels their membership in  
this group.  
Group members A simple dialog that can be used to add or remove computers from/to  
the selected group.  
Group properties A dialog for a change of parameters of the selected group (identical  
to the dialog for creation of a new group — see above).  
Sorting of list of computers The last three options in the menu determine sorting of  
the list of computers: by names (Sort by names), by IP addresses (Sort by addresses)  
or by a transferred data volume in a descending order (Sort by traffic).  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.2 Traffic chart  
7.2 Traffic chart  
Shows the chart of transferred data. The horizontal axis shows time, the vertical axis  
the connection load (in bytes per second).  
Buttons with arrows above the chart moves the vertical axis (from left to right):  
Jump to the beginning of the chart (i.e. the whole time interval, when the data was  
captured)  
Long jump backwards  
Short jump backwards  
Jump to the specified position (date and time)  
Short jump forwards  
Long jump forwards  
Jump to the end of a chart (i.e. the current time)  
Note: The length of a short and long jump depends on a scale of the chart.  
Buttons with a magnifying glass above the chart set the scale of the x-axis — i.e. the  
time interval that will be presented in the chart. The displayed interval can be between  
1 minute and 1 year.  
Buttons with a magnifying glass right to the chart set the scale of the vertical axis.  
Moreover, there exists an option Auto, which automatically adjusts the scale of this  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
axis to the maximum captured value in the given representation (the option is implicitly  
turned on). This guarantees good readability of the chart.  
Right mouse click in the chart area shows a menu with the following items:  
Save chart as picture Saves the chart as a picture in JPEG or BMP format.  
Zoom in, Zoom out Zooms in/zooms out the scale of the horizontal axis (time interval).  
The functionality of these options is the same as the functionality of the buttons  
“magnifying glass +” and “magnifying glass -” above the chart.  
View mode The user can switch between the following view modes:  
Sum of incoming and outgoing traffic — One line representing the sum of the  
incoming and outgoing data volume will be displayed in the chart (default setting)  
Incoming traffic — only the volume of the incoming (downloaded) data will be  
displayed in the chart  
Outgoing traffic — only the volume of the outgoing (sent) data will be displayed in  
the chart  
Both directions at once — two lines will be displayed in the chart — one for the  
incoming and the second for the outgoing traffic  
Type of chart The chart can be displayed in one of the following forms:  
Draw lines (default setting)  
Draw bars  
Draw polygons — stacked area (area under the line)  
7.3 Current Connections  
The Current connections item shows the window with current connections. This window  
contains information about the current TCP connections, or UDP and ICMP pseudocon-  
nections, respectively, from particular stations in a local network.  
The Current connections window contains a tree with two top-level items:  
All computers — this option shows all computers which are in the Kerio Network  
Monitor database (see chapter 7.1).  
Groups — particular groups (defined in the list of computers) are presented here.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.3 Current Connections  
The Current connections window shows only the computers (or groups, respectively) that  
have at least one connection open (the inactive computers are not displayed).  
Computers included in a group are displayed under the group. Particular connections  
of a computer are displayed under each computer. The log for the concrete connection  
has the following structure:  
TCP: zdenci:3568 -> 12.249.134.106:1214 290 + 183B 13 + 23B/s 3 /  
2s Active *unknown*  
TCP: — communication protocol (TCP, UDP or ICMP)  
zdenci:3568 — name (or IP address) of a computer in a local network (typically a  
client) and the port number  
12.249.134.106:1214 — name or IP address of a computer in the Internet (typically  
a server) and the destination port  
290 + 183B — volume of the sent and received data (in bytes)  
13 + 23B/s — speed of the transfer of the outgoing (sent) and incoming (received)  
data (in bytes per second)  
2 + 3s — time of the last data transfer and total time the connection was open (in  
seconds)  
Active — connection state (Syncing — connecting, Active — active / open, Clos-  
ing by initiator — terminating by client, Closing by responder — terminating  
by server, Closed — terminated, !!! ERROR !!! — terminated because of an er-  
ror).  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Closed connections remain displayed in the Current connections window for time  
specified in the program configuration (see chapter 6.5).  
An error occurs when a packet from a connection is lost and the connection lost  
synchronization (consecutively, the connection is terminated and the new one is es-  
tablished, if needed).  
*unknown* — name of service (if it is defined in Kerio Network Monitor — e.g. SMTP,  
HTTP, FTP etc.) or *unknown* (unknown service)  
Note: Kerio Network Monitor resolves names of computers using an analysis of the DNS  
procotocol. This can be done only if the DNS query was sent before the connection was  
initiated. If the client has this information in its local DNS cache, the DNS query is not  
sent and Kerio Network Monitor “sees” only the IP address of a destination server.  
Current Connections Window  
The Current connections toolbar contains the following functions and options (from left  
to right):  
Select columns & setup sorting This button opens the dialog window for the Current  
connections window parameters settings.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.4 Tree of Scanned Data  
Columns included in the connection list The user can select which columns (informa-  
tion) will be displayed in the Current connections window.  
Connection type — type of connection (TCP connection, UDP or ICMP pseudocon-  
nection)  
Local address — name or IP address of a local (source) computer and a source port  
Destination — name or IP address of a remote (target) computer and a target port  
Three functions mentioned above show basic information about the connection and  
that’s why it is not possible to turn them off (hide them).  
Sent & received bytes count — number of sent and received bytes  
Speed of the connection — speed of data transfer (incoming and outgoing direction)  
Time of last data transfer / connection duration — time of the last data transfer  
and the total time of connection  
Connection state — active, closed etc.  
Connection info — information about the service (if it is defined in the program)  
Included protocols Which protocols shall be monitored in the current connections  
window. Default settings include the TCP and UDP protocols.  
Sort the list on Choice of an item that will be used for sorting of the output in the  
window (Destination address — destination IP address, Bytes transferred — volume  
of transferred data, Current speed — speed of the connection, Connection age —  
connection duration, Connection state — state of the connection).  
Refresh now Updates information in the Current connections window.  
Refresh periodically When this option is turned on, the information in the Current  
connections window will be refreshed automatically in the periodic time intervals  
(every 1 second).  
7.4 Tree of Scanned Data  
Scanned data item opens the window where the captured data of particular services  
(WWW pages, e-mail messages, FTP relations etc.) can be viewed.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Tree of data (in the left part of the window) contains two base branches:  
By client — data sorted according to the IP address of clients (i.e. computers in a local  
network)  
By protocol — data sorted by particular protocols (services)  
Both branches contain identical data — they differ only in the type of sorting.  
The user can expand the selected branch of the tree and click on a concrete object (e.g.  
WWW page on a given server). This object will be displayed in the right part of the  
window.  
Note: If it is not forbidden in the program configuration (see chapter 6.7), content of  
e-mail messages will be displayed.  
Note #2: For WWW pages, Kerio Network Monitor records a particular URL and a page  
content (HTML code without pictures, applications etc.) When the page is being dis-  
played, the code is opened and the relevant objects are downloaded directly from a  
server (i.e. in the same way as a browser).  
Scanned Data Window  
The toolbar of the Scanned data window contains the following functions and options  
(from left to right):  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.5 Status Information  
Stop current transfer Stops the transfer of the opening WWW pages (as in a browser)  
Refresh tree Updates information in a tree (new data could be scanned since the  
Scanned data window was opened).  
This function can be invoked by F5 key.  
Max age The maximum age of data, which should be presented in the tree (in an inter-  
val from 5 minutes to one week, or unlimited age — *unlimited*). The Max age option  
affects noticeably the size and the readability of a tree.  
Show formatted Shows formatted WWW pages or e-mail messages  
Show as plain text Shows WWW pages or e-mail messages in a text format (source  
code)  
Open as document Opens pages or messages as a document (in a default WWW brows-  
er or an e-mail client)  
7.5 Status Information  
Status window shows information about the system with the Kerio Network Monitor Dae-  
mon installed, about the network interfaces and the disk space occupied by the database  
of the scanned data.  
System information System information (current time of the server, the installation  
directory, and the currently logged user). The logged user is displayed in a form  
name@server, where server is a DNS name or an IP address of the computer, where  
the Kerio Network Monitor Daemon service runs (to which the user is connected).  
Interface info Statistical information about the particular interface where Kerio Net-  
work Monitor captures packets. All these information are computed from the start  
of the Kerio Network Monitor Daemon service. Statistics are reset after the restart of  
the server.  
Interface name — interface for which the statistics will be displayed. This listbox  
contains all interfaces selected in the configuration program (see chapter 6.1) for  
the packet scanning.  
Packets passed — total number of packets passed to the Daemon for processing  
(their source and target address belongs to different groups)  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Packets filtered — number of filtered (discarded) packets — their source and target  
address belongs to the same group or some of these addresses belongs to the  
group Discard packet (see chapter 6.1)  
Too big packets — number of packets that couldn’t be processed because their size  
exceeded the maximum size of the cache of the low-level driver of Kerio Network  
Monitor. Greater number of these packets can indicate a system error or a possible  
attack.  
Transfer failures — number of packets that were not successfully copied from the  
internal cache of the network adapter. This error should not occur under normal  
circumstances (it can indicate a problem with an adapter or its driver).  
No resources — number of packets that were not successfully processed due to  
the lack of system resources.  
If this value is in the thousands, Kerio Network Monitor should be installed to a  
more powerful computer or to a dedicated computer where no user works.  
Disk space used by scanned data The size of disk volume occupied by captured data  
from particular services. The number of objects (Items) and bytes (Bytes) is displayed.  
The Sum column contains the total space occupied (sum of all services).  
Note: Presented data doesn’t include the space occupied by a database of a volume  
of transferred data (i.e. subfolders high and low).  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.6 Transferred Data Volume Table  
Disk space used by logs The total disk space occupied by recorded files and the total  
number of lines in these files.  
7.6 Transferred Data Volume Table  
The Report function shows - according to the specified paramaters - a window with the  
table of transferred data volume. If the window is not open, the dialog for parameters  
settings is displayed:  
Set column’s option Basic parameters specifying table extent:  
Number of columns — number of columns in a table  
One column contains traffic sumary — time interval which shall be covered by one  
column  
Combination of these two parameters determines the total extent of the table.  
Example: We want to display a number of transferred data during one week in one-  
day intervals. We enter value 7 (week has usually 7 days) to the editbox Number of  
columns and 1 day(s) to the One column contains traffic sumary.  
Select report’s start date Select start time and date (from when the data shall be pro-  
cessed). From that date the time period set in the previous section is interpreted.  
Button Suggest start date sets the start time so the chosen time period ends with the  
current time.  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Example: If we set the extent of a table according to the previous example, button  
Suggest start date sets the date and time seven days ago (i.e. the final table will  
display seven days).  
Checkbox When suggesting, include the current interval governs whether the suggest-  
ed start time includes the current interval (which is not finished yet).  
Example: Today is Saturday 1st June, 2002, 12:00 p.m. We consider the same interval  
as in the previous example (i.e. the data for one week in one-day intervals). The  
Suggest start time button sets the last Saturday (i.e. 25th May, 2002). The table  
will then contain the data for time period from Saturday 25th May, 2002 to Friday  
31st May, 2002. If we check the option When suggesting, include the current interval,  
the suggested date will be Sunday, 26th May, 2002 and the table will contain data for  
the period Sunday, 26th May, 2002 — Saturday, 1st June, 2002. The last column in  
the table will then contain the data for today (i.e. 0:00 a.m. — 12:00 p.m.). If we let  
the program create the table with the same parameters e.g. at 6:00 p.m., the data in  
the last column will be different.  
Select the service The user can select a service whose data will be displayed in a table.  
The concrete service (e.g. HTTP, SMTP, FTP etc.) or all services (All services) can be  
selected.  
Choose the traffic direction Chooses the direction of the traffic that should be cap-  
tured: Incoming only (only incoming data), Outgoing only (only outgoing data) or  
Sum of both (the sum of outgoing and incoming data).  
Show percentages Shows percentages instead of the transferred data for particular  
computers. If this option is checked, only the total volume of the transferred data  
for the relevant time period (item All computers) will be displayed in the table. The  
relevant volume of the transferred data will be displayed in percentages for each  
computer.  
The OK button creates and shows the table according to the specified parameters.  
Functions for the Data Volume Table  
The Accounting report window toolbar offers the following functions (from left to right):  
Change report parameters Changes table parameters. This option shows a dialog for  
the table settings (see above). When the dialog is closed, a new table is displayed.  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.7 Log Windows  
Print the report Prints the table. This option opens a standard system print dialog  
where a printer etc. can selected.  
Save the report Saves the table as an HTML page or in a CSV format (Comma Separat-  
ed Values). The CSV format is relatively common and it can be opened in a lot of  
programs (e.g. Microsoft Excel).  
Sort the table Sorts the table according to the selected column. This option can be  
used repeatedly — a new table need not to be created.  
Transfer the table to MS Excel If Microsoft Excel is installed on the host where the  
browser is running, you can use this button to transfer the table to the application.  
Microsoft Excel offers variety of other alternatives of how to process obtained data.  
7.7 Log Windows  
All log windows — (Connection Log, HTTP Log, Mail Log and Error Log) have a toolbar  
with these functions (from left to right):  
Copy selection to clipboard Copies the selected text to a clipboard (mouse can be use  
to select text). This function can be invoked using the standard hot key Ctrl+C.  
Save log to file Stores log to a text file in a text format (*.txt) or in a LOG format  
(*.log). This function can be invoked by the hot key Ctrl+W .  
In general, the LOG format is more suitable for an automatic processing while the text  
format is more readale for a user. For HTTP log, the LOG format is a standard (unix)  
log and the text format preserves the form presented on a screen. All other logs in  
the LOG format shows only IP addresses. In the text format, they are substituted by  
computer names (if they are known).  
Show only lines passing the rule Logs filtering. The user can display only the lines  
containing the specified string. For example, only the part of the log referring to a  
specific date can be displayed in this way.  
Log Reading and Analysis  
Each line of a log contains information about one event (e.g. about e-mail message, HTTP  
request, error message etc.).  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
Log files can be further processed by external analytical tools (e.g. by Kerio Log Analyzer  
application — see www.kerio.com).  
Connection Log  
TCP: richard:1524 -> 205.107.97.6:80 171 + 2927By,  
2s -HTTP:205.107.97.6  
Fri 8/Mar/2002 10:18:31 — date and time of a connection creation (formation)  
TCP: — used communication protocol at transport level (TCP/UDP)  
richard:1524 — name or IP address of a client (computer that originated the  
connection) and source port  
205.107.97.6:80 — name or IP address of a target computer (server) and desti-  
nation port  
171 + 2927By — volume of sent (171) and received (2927) data in bytes (By)  
2s — connection duration (in seconds)  
-HTTP:205.107.97.6 — service description (if it is a service defined in Kerio Net-  
work Monitor). This record shows “HTTP service on a server with IP address  
205.107.97.6”. If Kerio Network Monitor doesn’t have such a service, the error  
message unknown service is displayed.  
Note: Kerio Network Monitor resolves names of computers in the Internet using a DNS  
protocol analysis. This method can be used only if a DNS query had been sent before  
the connection was established. If a client contains this information in its local DNS  
cache, a DNS query is not sent and Kerio Network Monitor “sees” only the IP address  
of a target server.  
HTTP Log  
richard - Fri 8/Mar/2002 11:57:46  
HTTP/1.1 200 1221  
richard — name (or IP address) of a client (i.e. the computer that sent the HTTP  
query)  
Fri 8/Mar/2002 11:57:46 — date and time of a request  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.7 Log Windows  
GET — method of HTTP protocol (GET/POST)  
http://www.kerio.com/resources/home.gif — complete URL of a requested  
object  
HTTP/1.1 — HTTP protocol version (currently 1.0 or 1.1)  
200 — HTTP protocol return code (see document RFC2068 — www.ietf.org/rfc)  
1221 — size of an object (in bytes)  
Mail Log  
richard - Fri 8/Mar/2002 14:26:01  
SMTP From:"Richard Gabriel" <[email protected]>,  
to:<[email protected]>, subj:Order, 43 lines, 1366 bytes  
richard — name (or IP address) of a client (i.e. the computer that initiated the  
connection to a mail server)  
Fri 8/Mar/2002 14:26:01 — date and time of a message transfer  
SMTP — used mail protocol (SMTP, POP3 or IMAP)  
From: ... — e-mail address of a sender (and his name — if it was specified)  
to: ... — e-mail address of a recipient (and his name — if it was specified)  
subj: ... — message subject  
43 lines — number of lines in a message body  
1366 bytes — total size of a message (in bytes)  
Error Log  
Fri 8/Mar/2002 14:59:59 Warn - 192.168.2.38:  
5 packets lost - lack of resources (61-56)  
Fri 8/Mar/2002 15:02:11 Warn - (192.168.2.40 -> 201.7.55.112)  
Connection has died  
Fri 8/Mar/2002 15:17:22 Err: 206 - Error creating file  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7 Viewing and Analysis of Captured Data  
’c:\Program Files\Kerio\Network Monitor\logs\mail.idx’  
Fri 8/Mar/2002 14:26:01 — date and time when the error was logged  
Warn — type of a message (Warn — warning or Err: xxx — error including the  
error number)  
Warnings represent minor errors with smaller importance. The Kerio Network  
Monitor administrator should not ignore these warning and he should try to elim-  
inate all errors.  
192.168.2.38 — IP address of a computer where the error was logged. Addresses  
of source and target computers of the connection where an error occured can be  
presented here too.  
5 packets lost - lack of resources (61-56) — detailed error description  
Note: There is a large number of errors and warnings that can appear in Error Log.  
Their description goes beyond the scope of this guide. If you are not able to cope with  
an error yourself, you are advised to contact Kerio Technologies technical support —  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8  
Web Interface  
Kerio Netwok Monitor provides access to captured data using the basic Web interface.  
This interface can display a chart of connection load, list of current connections, and a  
transferred data volume table created according to the specified parameters.  
WWW interface operates in two modes: with an anonymous or authenticated user.  
The user can examine only data for his own computer (the computer which is used  
to connect to the inteface), or (if it is permitted) the aggregate data for the whole  
network, respectively. It is assumed that the user connects to the interface from his  
“own” computer and he will see only the data exactly for this computer.  
The authenticated user can examine all data provided by Kerio Netwok Monitor (i.e.  
data about all computers in a local network).  
8.1 Connection to the Web Interface  
The user must enter DNS name of a computer that runs Kerio Netwok Monitor Daemon  
(or IP address if it is not registered in DNS, respectively) and specify the port where the  
Web interface runs (implicitly 81) E.g. the URL can look like this:  
or  
If the computer where the Kerio Netwok Monitor Daemon is installed doesn’t run another  
WWW server, the WWW interface can be started on the default port 80 (see chapter 6.6)  
— port does not have to be specified in the URL:  
or  
User Login  
The user does not have to explicitly login to the WWW interface of Kerio Netwok Monitor.  
Immediately after the start, the interface operates in an anonymous mode (see above).  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Web Interface  
If you want to display data about all computers in a local network, log in the login  
section. Information about all computers becomes accessible after the successful login.  
In the other case, the WWW interface remains in the anonymous mode.  
8.2 Page Main  
This section shows information about the system where the Kerio Network Monitor Dae-  
mon runs (system time, license information, used disk space...).  
Information on this page (with a few exceptions) corresponds to the Engine status & info  
window — see chapter 7.5.  
8.3 Page Chart  
Page chart displays a chart of transferred volume data (as Traffic chart window — see  
chapter 7.6).  
Options in a left part of the page set chart parameters:  
Select red / blue / green sequence Chart on this WWW page can display at most  
3 lines (red, green and blue) - a type of displayed information can be set for each  
line. The choices are:  
All computers — total volume of transferred data for all computers  
Name of computer or group — volume of transferred data for the selected com-  
puter of group  
<none> — line will not be displayed. This option is available only for the second  
and the third line (i.e. the green and blue line).  
Select chart width Time interval that will be displayed in the chart (from 1 minute to  
1 year).  
Show Shows the chart with the specified parameters.  
Row of buttons is displayed above the chart. They move the chart content alongside the  
horizontal axis. Middle button Refresh is used to refresh the chart (the chart on a WWW  
page is not automatically refreshed because of technical reasons).  
8.4 Page Report  
This page corresponds to the Accounting report window. Before the page is opened, the  
options for table parameters settings are displayed:  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.5 Page Connections  
Select format Formats of the table (HTML page or file in CSV format)  
Specify report parameters Table parameters settings (see chapter 7.6).  
Show the report Shows the table of transferred volume data according to the specified  
parameters.  
8.5 Page Connections  
This page shows current connections of particular computers — it is an equivalent of  
the Current connections window. Page can not be configured.  
Details how to show current connections can be found in chapter 7.3.  
8.6 Page Logs  
This page shows the selected information from HTTP Log, Mail Log, and Connection Log  
(Error Log can be displayed only in the application).  
Select log Selects log (HTTP Log, Mail Log or Connection Log).  
Specify log options Specifies paramateres for log items that will be displayed:  
Show last ... days — show only log items for the last ... days. This option strongly  
affects the length of the displayed page, therefore we recommend to choose only  
the time period that is required.  
at most ... lines — maximum number of displayed lines  
Show only lines containing ... — show only lines containing the specified string (if  
you want to show all lines, leave the field empty)  
Resolve IP addresses of local computers — if this option is checked, the local com-  
puters will be displayed as DNS names (if they exist). Otherwise, only IP addresses  
will be displayed.  
Note: Remote computers (i.e. the computers that don’t belong to a local network)  
are always displayed as IP addresses.  
Show the log Shows log items according to the specified parameters.  
8.7 Integration of the WWW Interface into the Company Website  
The WWW interface of Kerio Network Monitor enables access to particular pages or their  
parts using the special URL. Various charts or tables (e.g. chart of connection load, table  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Web Interface  
of transferred data volume or view of current connections etc.) can be integrated into  
your own web site in this way.  
General Format of URL  
URL of pages from the WWW interface has, in general, this format:  
?parameter1=value&parameter2=value...  
where:  
netmon — DNS name or IP address of the computer, where Kerio Network Monitor  
runs.  
Note: Integration into another website must take into consideration if pages will be  
accessed from an internal network, from the Internet, or from both directions. The  
best way is to use the name of the server that has the aprropriate entries both in the  
internal and the public DNS.  
81 — port where the WWW interface of Kerio Network Monitor runs (see chapter 6.6)  
directory — directory of the virtual Web server where the appropriate is stored  
page — name of a page (see later)  
parameter=value — name of a parameter and its value (see later). Parameters are  
optional — if some parameter is not introduced, the default value will be used. Un-  
known (non-existing) parameter will be ignored. Some pages don’t require any pa-  
rameters.  
Note: Lower-case and upper-case letters in page names and parameter names should be  
preserved. Order of parameters doesn’t matter.  
All operations will be executed with the rights of anonymous user.  
Current Connections  
Current connections page can be displayed using the URL:  
The page doesn’t have any configurable parameters.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.7 Integration of the WWW Interface into the Company Website  
Chart of Transferred Data Volume  
The following URL displays the page with the chart of transferred data volume:  
?resolution=1&IP1=1.2.3.4&IP2=5.6.7.8  
&IP3=10.11.12.13&service=1  
where:  
resolution — time period from the following table:  
Value  
Meaning  
1 minute  
5 minutes  
15 minutes  
1 hours  
6 hours  
1 day  
0
1
2
3
4
5
6
7
8
1 week  
1 month  
1 year  
IP1, IP2, IP3 — IP addresses for which the transferred data volume will be dis-  
played in the chart (ordered red, greed, blue). Instead of an IP address of a particular  
computer, the address 0.0.0.0 (sum of data volume for all computers) or 127.0.0.1  
(loopback address; it will be replaced by the IP address of the computer, where the  
page was opened) can be entered.  
service — monitored service:  
Value  
0
1
2
3
4
5
6
7
Meaning  
All services HTTP POP3  
SMTP  
FTP  
Telnet  
IMAP4 SSH  
If the user wants to display an isolated chart (picture), he can use the following URL:  
All parameters described above remain valid.  
Example:  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Web Interface  
?resolution=3&IP1=0.0.0.0&IP2=127.0.0.1&service=1  
This example shows an isolated chart for time period 1 hour, the transferred data vol-  
ume for all computers will be highlighted in red color. The green color will represent the  
computer used for page viewing.  
Table of Transferred Data Volume  
The following URL shows the table of transferred data volume (Report) according to the  
specified parameters:  
?interval=2&back=7&columnscount=7&columnswidth=1  
&sort=3&direction=3&service=0,  
where:  
interval — basis of column width, it is multiplied by the parameter columnwidth.  
The possible values are:  
Value  
0
1
2
3
4
5
Meaning  
minutes  
hours days  
weeks  
months  
years  
back — the beginning of the table will be moved “backwards” by the specified number  
of time periods. Value 0 means current time.  
columnscount — number of columns in the table  
columnswidth — width of column. This parameter multiplied by the interval pa-  
rameter determines time interval covered by one column.  
sort — table will be sorted by this value:  
Value  
1
2
3
Meaning  
IP address  
computer name  
transferred data volume  
direction — table will display data in this direction:  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.7 Integration of the WWW Interface into the Company Website  
Value  
1
2
3
Meaning  
incoming (download)  
outgoing (upload) sum of both directions  
service — data volume will be displayed for this services (see above — section Chart  
of transferred data volume)  
Correct parameters settings will be demonstrated at the example.  
?interval=2&back=1&columnscount=7  
&columnswidth=1&sort=3&direction=3&service=0  
interval=2 — basis of column width will be one day  
columnswidth=1 — column width (time period) will be 1 day  
columnscount=7 — number of columns in table will be 7, the entire table will cover  
time period of 7 days (1 week)  
back=1 — table moved backwards by one time period (i.e. 1 week). As a result, the  
table will cover time period “-2 weeks to -1 week”.  
direction=3 — table will contain sum of incoming and outgoing data  
service=0 — total volume of transferred data will be displayed (for all services)  
Logs  
Logs can be displayed using the URL:  
?log=2&age=7&maxlines=1000&filter=text  
where:  
log — log file number according to the following table:  
Value  
2
3
4
Meaning  
HTTP Log  
Connection Log  
Mail Log  
age — maximum age of log (in days)  
maxlines — maximum number of output lines (if more lines satisfy the other condi-  
tions, only the most recent lines will be displayed)  
filter — text to be searched. Only the lines containing this text will be displayed.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8 Web Interface  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9  
Glossary of Terms  
E-mail address Determines message recipient and sender during communication using  
the electronic mail.  
HTTP Protocol for WWW pages transfer. By default, TCP protocol and port 80 is used.  
HTTPS Secured version of HTTP protocol. Security is ensured by the encrypted protocol  
SSL.  
By default, TCP protocol and port 443 is used.  
IMAP Clients can work with their e-mail messages on a server using IMAP. Messages  
don’t need to be downloaded to local computer.  
By default, TCP protocol and port 143 is used.  
Packet Basic communication unit of network layer (i.e. independent of the communica-  
tion medium). The IP protocol works on packet layer in TCP/IP.  
POP3 Post Office Protocol enables users to download e-mail messages from a server to  
their own local disc.  
By default, TCP protocol and port 110 is used.  
Port A port is a 16-bit number (the allowed range being 1 through 65535) used by  
TCP and UDP protocols for identification of applications (services) on a particular  
computer. Several applications may run at once (e.g. WWW server, e-mail client,  
WWW client — browser, FTP client, etc.). Each application is uniquely determined by  
its port number. Ports 1 through 65535 are reserved for standard or system use (e.g  
80 = WWW). Ports above 1024 (inclusive) may be used by any application (typically as  
a source port by a client or by a non-standard server application).  
Protocol Format specification of transferred data and methods of their processing. Two  
computers must use the same protocols to be able to communicate.  
Majority of network protocols is standardized, so they can be used for a communi-  
cation between devices from different vendors. Set of protocols used in the Internet  
and known in general as TCP/IP can be used as an example.  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9 Glossary of Terms  
Proxy server An older method of Internet connection sharing. Client in a local network  
does not communicate directly with the target computer in the Internet but it passes  
its request to a proxy server. The proxy server will process the request and deliver  
the response.  
SMTP Basic protocol used for e-mail delivery in the Internet. Sender and recipient are  
identified by an e-mail address.  
By default, TCP protocol and port 25 is used.  
Service In network terminology, application used in an network environment is called  
a service. In TCP/IP, the service is identified by a transport protocol and port (e.g.  
HTTP uses TCP protocol and port 80).  
SSL Protocol for secured and encrypted TCP connection. Originally, it was created to  
secure the transmission of WWW pages by the HTTP protocol (this protocol is called  
HTTPS). Today, almost all standard Internet services — SMTP, POP3, IMAP, LDAP, etc.  
— supports SSL.  
Communicatin starts by the exchange of an encryption key, which is later used for a  
(symetrical) encryption of the real data.  
TLS Transport Layer Security. SSL successor, de facto SSL version 4.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 10  
Index  
31  
storage time 33  
storing to file 55  
adapter  
login  
network 21  
to the viewer 19  
WWW interface 59  
computers  
logs  
groups 44  
list 42  
location on the disk 11  
names 43  
connection  
log 56  
protocol 25, 29  
captured data view 50  
connection monitoring 49  
HTTPS 38  
principle of watching 10  
connections  
active 61  
parameters 34  
TCP  
UDP  
9
9
current 46  
Daemon 9, 9, 15, 20  
service 25  
debugging 29  
definition 27  
interface  
network 23, 51  
Web 59  
display 54  
principle of watching 10  
WWW 35  
IP addresses 23  
IP addresses 9, 12, 17, 26  
users  
accounts 29  
login 19  
number 17  
log  
Connection Log 56  
display on WWW page 61  
Error Log 57  
viewer 19  
Viewer  
9
HTTP Log 38, 56  
Mail Log 57  
viewer 16  
Viewer 41  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Indesit Dishwasher DG 6145 User Manual
Jackson Dishwasher Dishmachine Component User Manual
Jackson Dishwasher JV 24 B BF User Manual
John Deere Air Compressor AC2 80ES User Manual
Juniper Networks Network Router V10000 User Manual
Kenmore Refrigerator 93361 User Manual
Kenwood Car Video System KVT 627DVD User Manual
Kenwood Home Theater System KRF V5020 User Manual
KitchenAid Beverage Dispenser KUWS24LSBS00 User Manual
Korg Electronic Keyboard MMT User Manual