ZyXEL Communications VANTAGE CNM User Manual page 16

Centralized network management
Hide thumbs Also See for VANTAGE CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
23.6 Top Users of Services ....................................................................................289
Web Filter .............................................................................................................. 300
24.1 Web Filter Summary ......................................................................................300
24.2 Web Filter Top Sites .......................................................................................302
24.3 Web Filter Top Users ......................................................................................303
24.4 Web Filter By User .........................................................................................304
Attack Reports...................................................................................................... 306
25.1 Attack Summary .............................................................................................306
25.2 Attack Categories ...........................................................................................307
25.3 Source of Attacks ...........................................................................................309
25.4 Attack Errors and Exceptions .........................................................................311
Authentication ...................................................................................................... 314
26.1 Successful Logins ..........................................................................................314
26.2 Failed Logins ..................................................................................................315
Log Viewer ............................................................................................................ 316
27.1 Log Monitor ....................................................................................................316
27.2 Log Search ....................................................................................................319
15
23.5.1 All Services Top Sites ...........................................................................281
23.5.2 Top Site Service Settings ......................................................................282
23.5.3 Web Service Top Sites ..........................................................................283
23.5.4 FTP Service Top Sites ..........................................................................284
23.5.5 Mail Service Top Sites ..........................................................................286
23.5.6 VPN Traffic Top Sites ............................................................................287
23.5.7 Custom Service Top Sites .....................................................................288
23.6.1 Top Users of All Services ......................................................................290
23.6.2 Top Site Service Settings ......................................................................291
23.6.3 Top Users of Web Services ..................................................................292
23.6.4 Top Users of FTP Services ...................................................................293
23.6.5 Top Users of Mail Services ...................................................................294
23.6.6 Top Users of VPN Tunnels ...................................................................296
23.6.7 Top Users of Custom Services .............................................................297
25.2.1 Attack Category Settings ......................................................................309
25.3.1 Attack Source Settings .........................................................................311
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents