CyberMONITOR User’s GuidexiContentsCHAPTER 1 INTRODUCTIONRelated Documentation ...................................................................................1-1How to Use This Guide ....................................................................................1-1Document Conventions ...................................................................................1-2Technical Support ............................................................................................1-2CHAPTER 2 CYBERMONITOR OVERVIEWAbout The CyberMONITOR..............................................................................2-1Graphical User Interface ..................................................................................2-1Port Interface Icons ..........................................................................................2-2Port Interface Stats Panels ..............................................................................2-3Primary Monitor Window Function Menu.......................................................2-3Statistical Data Tables .....................................................................................2-6Data Table Function Buttons...........................................................................2-6Statistics Charts ...............................................................................................2-6Alarm Settings ..................................................................................................2-9CyberMONITOR Help System........................................................................2-12Contents Page ..........................................................................................2-12Index..........................................................................................................2-12Glossary....................................................................................................2-12Getting Help..............................................................................................2-13CHAPTER 3 USING CYBERMONITORPrerequisites.....................................................................................................3-1Local User Networks ........................................................................................3-2Custom Interval ................................................................................................3-4Start/Stop Times Window ................................................................................3-4Long-Term Monitoring Sessions ..............................................................3-5Primary Monitor Window .................................................................................3-5Function Menus ................................................................................................3-7