Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guia do Utilizador Página 35

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 79
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 34
selected. The “Monitored Network IP Addresses and Ranges” option determines the IP address ranges that PVS will
monitor. The “Excluded Network IP Addresses and Ranges” option determines the IP address ranges that PVS will not
monitor. Both fields accept IPv4 and/or IPv6 CIDR address definitions. When multiple addresses are used, separate the
entries using commas.
Once the Quick Setup steps are completed, log out of the web interface. The PVS service must be stopped and started
for the settings to take effect. PVS is then ready to use. The user may log in and is presented with the default “Monitoring”
page. Once PVS has started monitoring traffic, the page will display a list of hosts by using a bar chart that indicates the
number of vulnerabilities each host has, color coded to the severity level.
Using the PVS Interface
The primary feature change to PVS 4.0 is the ability to analyze data and configure PVS utilizing a HTML5 front end. The
interface for PVS has been tested and works on browsers that support HTML5, including the latest available versions
available at the time of this writing including Microsoft Internet Explorer 9-11 (version 9 being the minimum supported),
Firefox 24 and later, Opera 16 and later, and Google Chrome 30 or later. Other browsers that support HTML5 have been
reported to work, but have not been fully tested by Tenable. This allows PVS to be placed on networks, monitor traffic,
and have the results provided to users without the need for SecurityCenter or a third party tool to analyze the data.
Once logged into PVS, the user is initially presented with the Monitoring page, which includes several navigation options
across the top.
Navigation
Navigation through the PVS interface starts with the options available across the top menu bar.
The four options are titled Monitoring, Results, Users, and Configuration. The Users and Configuration pages are only
available to Administrator level users. From these pages, all of the primary analysis and maintenance tasks may be
performed. Clicking any of the page names will present the user with that page.
The right side of the menu bar indicates the username of the currently logged in user. Clicking the name will present a
drop-down menu with three selections. The first is to change the user’s password (which must contain 5 characters,
including at least one each of a lowercase letter, uppercase letter, digit, and a special character). Information about the
Vista de página 34
1 2 ... 30 31 32 33 34 35 36 37 38 39 40 ... 78 79

Comentários a estes Manuais

Sem comentários