Figure 58 Network Attack > Intrusion > Top Sources > Drill-Down; Table 53 Network Attack > Intrusion > Top Sources > Drill-Down - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Figure 58 Network Attack > Intrusion > Top Sources > Drill-Down
Each field is described in the following table.
Table 53 Network Attack > Intrusion > Top Sources > Drill-Down
LABEL
title
graph
Intrusion Signature
Color
Severity
Type
Intrusions
Chapter 6 Network Attack
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Select PIE chart or BAR chart in the drop-down list box. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart. The
yellow conversation box identifies the slice or bar.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top intrusion signatures from the selected source, sorted
by the number of intrusions by each one.
This field displays what color represents each intrusion signature in the graph.
This field displays the severity of each intrusion signature.
This field displays what kind of intrusion each intrusion signature is. This
corresponds to IDP > Signature > Attack Type in most ZyXEL devices.
This field displays the number of intrusions by the selected source using each
intrusion signature.
Vantage Report User's Guide
124

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents