ZyXEL Communications USG FLEX H Series User Manual page 74

Table of Contents

Advertisement

Figure 62 Security Statistics > Reputation Filter > URL Threat Filter
The following table describes the labels in this screen.
Table 37 Security Statistics > Reputation Filter > URL Threat Filter
LABEL
Last 24 Hours Summary
Top Entries By
Refresh
Flush Data
URL Threat Filter Events
Time
+ Allow List
URL
Category
Source IP
Destination IP
Apply
Reset
Chapter 5 Monitor
DESCRIPTION
Use this field to have the following (read-only) table display the top URL threat filter log
entries by Category, URL or Source IP. This table displays the most common, recent URL
threat filter logs. See the log screen for less common URL threat filter logs or use a syslog
server to record all URL threat filter logs.
Select Category to list the most common categories of packets that the Zyxel Device has
detected.
Select URL to list the most common URLs of the infected websites.
Select Source IP to list the most common source IP addresses of traffic.
Click this button to update the report display.
Click this button to discard all of the screen's statistics and update the report display.
This field displays the date and time the entry was created.
Select an entry and click this to add it to the URL Threat filtering allow list.
This field displays the URL of an infected website.
This field displays the category of the entry.
This field displays the source IP address of traffic that you want to trace.
This field displays the destination IP address of traffic.
Click Apply to save your changes back to the Zyxel Device.
Click Reset to return the screen to its last-saved settings.
USG FLEX H Series User's Guide
74

Advertisement

Table of Contents
loading

Table of Contents