Introducing IBM Security Network Intrusion Prevention System (IPS) Products
Home: Monitoring the dashboard
Monitor: Health and Statistics
Secure: Protection Settings
Manage: System Settings
Review: Analysis and Diagnostics
    Reviewing Logs
    Using Diagnostics
       Using Ping
       Using Traceroute
       Using SNORT Rule Profiling
    Logs and Packet Captures