Top Attack Sources Drill-Down; Table 44 Network Attack > Attack > Top Sources - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Each field is described in the following table.
Table 44 Network Attack > Attack > Top Sources
LABEL
title
Last ... Days
Settings
graph
Source
Color
Attacks
% of Attacks
Total

6.1.4 Top Attack Sources Drill-Down

Use this report to look at the top categories of DoS attacks for any top source.
107
DESCRIPTION
This field displays the title of the statistical report. The title includes the date(s)
you specified in the Last Days or Settings fields.
Use this field or Settings to specify what historical information is included in the
report. Select how many days, ending (and including) today, you want to include.
When you change this field, the report updates automatically. This field returns
to zero, so you can refresh the report by selecting it again. You can see the
current date range in the title.
This field resets to its default value when you click a menu item in the function
window (including the menu item for the same report). It does not reset when
you open or close drill-down reports.
Use this field or Last ... Days to specify what historical information is included in
the report. Click Settings. The Report Display Settings screen appears.
Select a specific Start Date and End Date. The date range can be up to 30 days
long, but you cannot include days that are older than Store Log Days in System
> General Configuration. Click Apply to update the report immediately, or click
Cancel to close this screen without any changes.
This field resets to its default value when you click a menu item in the function
window (including the menu item for the same report). It does not reset when
you open or close drill-down reports.
The graph displays the information in the table visually.
Select PIE chart or BAR chart in the drop-down list box. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart. The
yellow conversation box identifies the slice or bar.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top sources of DoS attacks in the selected device, sorted
by the number of attacks by each one. If the number of sources is less than the
maximum number of records displayed in this table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled in
System > General Configuration, the table displays the domain name, if
identifiable, with the IP address (for example, "www.yahoo.com/200.100.20.10").
Click on a source to look at the top categories of DoS attacks by the selected
source. The Top Attack Sources Drill-Down report appears.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks by each source.
This field displays what percentage of all DoS attacks was made by each
source.
This entry displays the totals for the sources above.
Chapter 6 Network Attack

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents