Intrusion; Intrusion Summary - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Table 47 Network Attack > Attack > By Category > Drill-Down
LABEL
% of Attacks
Total
Back

6.2 Intrusion

Use these reports to look at intrusion signatures, types of intrusions, severity of intrusions, and
the top sources and destinations of intrusions that are logged on the selected ZyXEL device.
Intrusions are caused by malicious or suspicious packets sent with the intent of causing harm,
illegally accessing resources or interrupting service. They are detected by selected device's
IDP feature.
Note: To look at intrusion reports, each ZyXEL device must record intrusions in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go
to IDP > Signature, and make sure the ZyXEL device logs each Attack Type
you want to see in Vantage Report.

6.2.1 Intrusion Summary

Use this report to look at the number of intrusions by time interval.
Note: To look at intrusion reports, each ZyXEL device must record intrusions in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go
to IDP > Signature, and make sure the ZyXEL device logs each Attack Type
you want to see in Vantage Report.
Click Network Attack > Intrusion > Summary to open this screen.
113
DESCRIPTION
This field displays what percentage of all DoS attacks in the selected category
were made by each source.
This entry displays the totals for the sources above. If the number of sources in
the selected category is greater than the maximum number of records displayed
in this table, this total might be a little lower than the total in the main report.
Click this to return to the main report.
Chapter 6 Network Attack

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents