Top Intrusion Destinations - ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Table 53 Network Attack > Intrusion > Top Sources > Drill-Down
LABEL
% of Intrusions
Total
Back

6.2.7 Top Intrusion Destinations

Use this report to look at the top destinations of intrusions by number of intrusions.
Note: To look at intrusion reports, each ZyXEL device must record intrusions in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go
to IDP > Signature, and make sure the ZyXEL device logs each Attack Type
you want to see in Vantage Report.
Click Network Attack > Intrusion > Top Destinations to open this screen.
125
DESCRIPTION
This field displays what percentage of all intrusions by the selected source was
made by each intrusion signature.
This entry displays the totals for the intrusion signatures above. If the number of
intrusion signatures from the selected source is greater than the maximum
number of records displayed in this table, this total might be a little lower than
the total in the main report.
Click this to return to the main report.
Chapter 6 Network Attack

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents