ZyXEL Communications VANTAGE CNM User Manual page 30

Centralized network management
Hide thumbs Also See for VANTAGE CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Table 123 FTP Services Summary ..................................................................................... 277
Table 124 Mail Services Summary ..................................................................................... 278
Table 125 VPN Services Summary .................................................................................... 279
Table 126 Custom Service Group ...................................................................................... 280
Table 127 Top Sites for All Services ................................................................................... 281
Table 128 Top Site Service Settings ................................................................................... 282
Table 129 Web Service Top Sites ...................................................................................... 283
Table 130 FTP Service Top Sites ....................................................................................... 284
Table 131 Mail Service Top Sites ....................................................................................... 286
Table 132 VPN Service Top Sites ...................................................................................... 287
Table 133 Custom Service Top Sites ................................................................................. 288
Table 134 All Services Top Users ....................................................................................... 290
Table 135 Top Site Service Settings ................................................................................... 291
Table 136 Top Users of Web Services ............................................................................... 292
Table 137 Top Users of FTP Services ................................................................................ 293
Table 138 Top Users of Mail Services ................................................................................ 294
Table 139 Top Users of VPN Tunnels ................................................................................ 296
Table 140 Top Users of Custom Services .......................................................................... 297
Table 141 Web Filter Summary .......................................................................................... 300
Table 142 Web Filter Top Sites .......................................................................................... 302
Table 143 Web Filter Top Users ......................................................................................... 303
Table 144 Web Filter By User ............................................................................................ 304
Table 145 Attack Summary ................................................................................................ 306
Table 146 Attack Categories .............................................................................................. 307
Table 147 Source of Attacks .............................................................................................. 310
Table 148 Attack Errors and Exceptions ............................................................................ 312
Table 149 Successful Logins .............................................................................................. 314
Table 150 Failed Logins ..................................................................................................... 315
Table 151 Log Monitor ........................................................................................................ 318
Table 152 Log Search ........................................................................................................ 319
Table 153 General System Configuration .......................................................................... 320
Table 154 Schedule Reports .............................................................................................. 321
Table 155 Schedule Daily Reports ..................................................................................... 322
Table 156 Schedule Daily Reports ..................................................................................... 324
Table 157 Daily Reports ..................................................................................................... 329
Table 158 Over Time Report .............................................................................................. 331
Table 159 FTP and syslog Server Overview ...................................................................... 346
Table 160 Classes of IP Addresses ................................................................................... 352
Table 161 Allowed IP Address Range By Class ................................................................. 353
Table 162 "Natural" Masks ................................................................................................ 353
Table 163 Alternative Subnet Mask Notation ..................................................................... 354
Table 164 Two Subnets Example ....................................................................................... 354
Table 165 Subnet 1 ............................................................................................................ 355
29
List of Tables

Advertisement

Table of Contents
loading

Table of Contents