Products Sax2 Screenshots

Concise Interface

       The Sax2’s main interface is composed of  label a window and two floating window, so users can easily switch back and forth in different windows. Each window is vista style, concise and fashion.

 Concise interface of sax2 intrusion prevention system

Dashboard

You can view the attacks in your network via the visual Dashboard. The Dashboard including - the level, amount and distribution of risk, trend of the attacks, trend of network traffic, Top 10 attacks internal and Top 10 attacks external.

Log Analysis

Sax2 4.0 enhanced powerful and easy-to-use Log Analysis. The administrator can view the details of attacks in network via the log analysis.

Conversation View

Conversation view is a more important part of Sax2. The view is divided into two parts, shown above is the current network of communication or the end of the conversation in communication, including IP, TCP, UCP and ICMP. By viewing each conversation, we can count its source address, destination address, the data packets of conversation and the size of these data packets and other information. We can identify the current communications of a conversation through such information. Below is part of the invasion log and data stream table window, when you try to choose a different conversation in conversations, it shows that the incident related to the invasion, and shows all invasions by default.     

Conversation views of sax2 intrusion prevention system

Event View

   Invasion view’s the main function is focus checking invasions. The view has the invasion event pane and invasion log pane two parts. The invasion events statistics by different pane show that the classification of the current network in all the statistical value of the invasion, following is part of the invasion log pane. When you choose a different entry in Statistics Pane, it shows that the incident related to the invasion, and shows all invasions by default.

Event views of sax2 intrusion prevention system

Logs View

Log view records application layer traffic information in the network, including HTTP request (Web browser), e-mail message (through the mail SMTP/POP3), FTP transmission and MSN. And log information will be saved to your hard disk for inspection in accordance with the needs of these users.

The interface of Log view shown below (the currently selected types of logs is HTTP request). The view is divided into two parts, the left window is a list of all types of logs, and the right window is logs list. Click the left side of the different types of logs in the superscript, and then you will see its counterpart in the log on the right of the window.

Logs views of sax2 intrusion prevention system

Nodes Explorer

Node explorer window displays all those involved in network communication host of physical address or IP address. When you select a node in this explorer window, the data displayed in tab views changes accordingly, such as: statistics, conversation, logs, etc.

Nodes explorer of sax2 intrusion prevention system

Knowledge Base Management

Sax2 provides more than 1,500 of the security policies by default, Also, according to their own needs we can customize any security strategy, targeting intrusion detection system which is the most suitable for their own.     

Knowledge base management of sax2 intrusion prevention system

Detection Experts Settings

“Detection Experts setting “is an important feature of Sax2 ,which can analyze all the traffic expert-level intelligence in the network, and report the invasion.

Detection experts settings of sax2 intrusion prevention system