Top Attack Sources; Figure 49 Network Attack > Attack > Top Sources - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Table 43 Network Attack > Attack > Summary > Drill-Down
LABEL
Total
Back

6.1.3 Top Attack Sources

Use this report to look at the top sources of DoS attacks by number of attacks.
Note: To look at attack reports, each ZyXEL device must record DoS attacks in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure Attacks is enabled.
Click Network Attack > Attack > Top Sources to open this screen.
Figure 49 Network Attack > Attack > Top Sources
Chapter 6 Network Attack
DESCRIPTION
This entry displays the totals for the categories above. If the number of
categories in the selected time interval is greater than the maximum number of
records displayed in this table, this total might be a little lower than the total in
the main report.
Click this to return to the main report.
Vantage Report User's Guide
106

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents