English
Language : 

J7824A Datasheet, PDF (5/8 Pages) Keysight Technologies – Network Monitoring Content Intercept Manager
05 | Keysight | Network Monitoring Content Intercept Manager - Data Sheet
Detailed view screen
Drill down on selected call of interest:
– Examine individual events for each phase of a selected call in detail
– View more esoteric fields of interest (e.g. Mobile Station classmark) to gain greater insight into your targets behaviour (point of interest
groups may choose handsets with specific capabilities)
Multi-level security access procedures
Access to CIM is controlled via rigorous protocols and procedures, so that only authorized users are able to set up targets or view the data gener-
ated by CIM. Usernames and password authentications are required whenever users log on to the system. Additional restrictions can be imposed
by setting up user permissions that restrict the viewing of certain points of interest to a subset of users. Encypted VPN data communication
methods are supported.