Hp Secure Key Manager Bedienungsanleitung Seite 260

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 352
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 259
Figure 152 Viewing the Throughput section
The following table describes the components of the Throughput section.
Table 137 Throughput section components
DescriptionComponent
This field expresses in megabits per second the amount of data passing through the
KMS Server. This traffic is generated when the SKM processes client requests. This does
exclude any overhead from the SSL, TCP, or IP protocols. Furthermore, this does exclude
traffic to the Management Console or the SSH administration tool.
Incoming Throughput bytes flowing into the KMS Server as a result of client re-
quests.
Outgoing Throughput bytes flowing out of the KMS Server as a result of responses
to client requests.
Total Throughput the rate at which bytes are flowing into and out of the SKM for
client traffic.
KMS Server Statistics
This field expresses in megabits per second the amount of data passing through each
interface on the SKM. The Interface Statistics measure all traffic flowing through the
box, including data generated from client requests, SSH connections, SNMP traps, log
rotation, etc.
Incoming Throughput bytes flowing into the SKM.
Outgoing Throughput bytes flowing out of the SKM.
Total Throughput sum of bytes flowing into and out of the SKM.
Interface Statistics
License Usage
The License Usage section shows how many clients are connected to an SKM at any given time.
Figure 153 Viewing the License Usage section
The following table describes the components of the License Usage section.
Table 138 License Usage section components
DescriptionComponent
Displays the IP addresses connected to the SKM.Client IP Address
Using the Management Console260
Seitenansicht 259
1 2 ... 255 256 257 258 259 260 261 262 263 264 265 ... 351 352

Kommentare zu diesen Handbüchern

Keine Kommentare