Top Intrusion Signatures Drill-Down - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Table 50 Network Attack > Intrusion > Top Intrusions
LABEL
Settings
graph
Intrusion Signature
Color
Severity
Type
Intrusions
% of Intrusions
Total

6.2.4 Top Intrusion Signatures Drill-Down

Use this report to look at the top sources of intrusions for any top signature.
Click on a specific intrusion signature in Network Attack > Intrusion > Top Intrusions to
open this screen.
119
DESCRIPTION
Use this field or Last ... Days to specify what historical information is included in
the report. Click Settings. The Report Display Settings screen appears.
Select a specific Start Date and End Date. The date range can be up to 30 days
long, but you cannot include days that are older than Store Log Days in System
> General Configuration. Click Apply to update the report immediately, or click
Cancel to close this screen without any changes.
This field resets to its default value when you click a menu item in the function
window (including the menu item for the same report). It does not reset when
you open or close drill-down reports.
The graph displays the information in the table visually.
Select PIE chart or BAR chart in the drop-down list box. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart. The
yellow conversation box identifies the slice or bar.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top intrusion signatures in the selected device, sorted by
the number of intrusions by each one.
Click on an intrusion signature to look at the top sources for the selected
signature. The Top Intrusion Signatures Drill-Down report appears.
This field displays what color represents each intrusion signature in the graph.
This field displays the severity of each intrusion signature.
This field displays what kind of intrusion each intrusion signature is. This
corresponds to IDP > Signature > Attack Type in most ZyXEL devices.
This field displays the number of intrusions by each intrusion signature.
This field displays what percentage of all intrusions was made by each intrusion
signature.
This entry displays the totals for the intrusion signatures above.
Chapter 6 Network Attack

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents