User manual
All of the VIEW settings are designed to prohibit an unauthorized user
from viewing potentially secure data (phone numbers, email addresses,
device names etc.) – check the box to enable each function.
· VoIP DATA – the user can START/STOP/CLEAR VoIP data collection,
and can save the results of the collection as part of the detector
database.
· EMAIL DATA – similar to VoIP DATA but affects the EMAIL screen.
· CAPTURED DATA - similar to VoIP DATA but affects the CAPTURE
screen.
· 802.1X DATA - similar to VoIP DATA but affects the 802.1X screen.
· DEVICE DATA - similar to VoIP DATA but affects the DEVICES and
TOP TALKERS screens.
All of the GENERATE settings are designed to stop an unauthorized user
from performing an operation that has the potential of bringing down a
network, or setting off a network security alarm.
· TRAFFIC – enables/disables the respective user‘s ability to use
TRAFFIC GENERATE.
· PINGS - enables/disables the respective user‘s ability to use PING/
TRACE.
3-26
Setup
Security
Account Access
NOTE: Select the Exit button to apply the changes to the users’ access
and to go back to the Security Home Screen.
Chapter 3
Security Access Screen










