Information Security Gateway
Tunnels are host-based software. They provide a secure channel for communication. The purpose
is to break through a firewall and escape content inspecting. For example, like soft ether, VNN,
and VNC.
EIM
The EIM table provides layer seven monitoring. A packet is classified by its application pattern
and summarized into six categories: IM, P2P, Web application, file transfer, E-mail, and media.
If a host is connecting to the Internet and identified as a category application, the table shows a
check mark to indicate the host is currently running the application with that specific category.
Chapter 5: Real Time Monitor -- 83