Users Guide

vN
[!]
(g 7-1
3d 7-1
9Ze |D 7-5
E3/v 7-1
Audit.eventQueue.max 7-2
Audit.event.outcome 7-2
Audit.event.types 7-1
Audit.handler.file.directory 7-3
Audit.handler.file.multithreads 7-4
Audit.handler.file.name 7-4
Audit.handler.file.size 7-3
Audit.handler.file.threadlifespan 7-4
S: 7-6
L%. 7-8
v! 7-5
3Nk/xk 0 2-11
h9 2-1
h9 mAgW
sLj/.!- |. 2-2
O#- 2-1, 2-2
|. 5-1
8:
\O -v 2-9
N 3G -v 2-9
Key Manager 4-4
8: nO $8
-v B-1
,sLp. B-11
[Y]
nO $8 3$ B-1
m} 3-12
pvW B-5
p:) esLj, vxJ 2-2
[s]
sLj/.!- |.OB O#- 1-6
[6]
^Cv 6-10
!.@b GP 6-11
|. 0 zeR& NeR v x= 6-16
8: h& GP 6-11
8:v$ GP 6-12
8: DO!- SSL w. x#& v$X_
T 6-14
8: DO!- TCP w. x#& v$X_
T 6-15
8: DOG SSL w. x#! CY#v J
= 6-14
8: DOG TCP w. x#! CY#v J
= 6-14
8: DOL v$Gv J= 6-10
?b- GP 6-15
?b-R %LM x= 6-13
esLj _! GP 6-10
esLj Wq h& GP 6-11
NW DO! F+Lj GP 6-10
-v C[ GP 6-15
CY#v J:TB 6-13
|[ 0 zeR& NeR v x= 6-17
vxGv JB 6! 6-18
v$H (g NW
DOL Pb |kS
6-16
0 zeR& NeR v x= 6-17
DOL': N(null)O v x= 6-12
DO )b QhB =vO v x= 6-12
^8%LM 8-1
mI` NMdL: 5-10
C[ 5-6
.&! G0 6-1
.NR DO 6-1
.&! Xa
O#- gk 6-6
.&!, G0 W Xa
O#- gk 6-6
[g]
s% D-1
-v
8: 2-9
Y% -vM ?b- 4-2
-v ?b- 4-2
-{
|C x
BsN x
Linux x
Windows x
3! W 8: 4-1
3! - Linux(Intel) 3-1
RA.~n d8gW 2-2
C[
mI` NMdL: 5-6
C[ W _v
-v 5-1
[F]
O#-
3Nk 0(Private key) 1-6
h9 2-1, 2-2
xk 0(Public key) 1-6
k* O#- 1-6
%LM0 1-6
sLj/.!- |. 1-6
qk* O#- 1-6
Km.r 1-6
@kANW%!- |. 1-5
0 1-6
0 &N 1-6
0 O#- 0 1-6
EEDK(Externally Encrypted Data
Key) 1-6
Encryption Key Manager!- 8mOB
@y 6-6
@y
Encryption Key Manager-8m 6-6
d8gW
Oe~n W RA.~n 2-2
kn
E-1
kn} E-1
@kANW%!- |.OB O#- 1-5
X-1