ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual page 14

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Figure 37 Traffic > MAIL > Top Hosts > Drill-Down ............................................................. 83
Figure 38 Traffic > VPN > Top Peer Gateways ................................................................... 85
Figure 39 Traffic > VPN > Top Peer Gateways > Drill-Down .............................................. 87
Figure 40 Traffic > VPN > Top Hosts ................................................................................... 89
Figure 41 Traffic > VPN > Top Hosts > Drill-Down .............................................................. 91
Figure 43 Traffic > Customization > Top Destinations ......................................................... 94
Figure 45 Traffic > Customization > Top Sources ............................................................... 97
Figure 46 Traffic > Customization > Top Sources > Drill-Down .......................................... 99
Figure 47 Network Attack > Attack > Summary .................................................................. 103
Figure 48 Network Attack > Attack > Summary > Drill-Down .............................................. 105
Figure 49 Network Attack > Attack > Top Sources .............................................................. 106
Figure 50 Network Attack > Attack > Top Sources > Drill-Down ......................................... 108
Figure 51 Network Attack > Attack > By Category .............................................................. 110
Figure 52 Network Attack > Attack > By Category > Drill-Down ......................................... 112
Figure 53 Network Attack > Intrusion > Summary .............................................................. 114
Figure 54 Network Attack > Intrusion > Summary > Drill-Down .......................................... 116
Figure 55 Network Attack > Intrusion > Top Intrusions ....................................................... 118
Figure 57 Network Attack > Intrusion > Top Sources .......................................................... 122
Figure 58 Network Attack > Intrusion > Top Sources > Drill-Down ..................................... 124
Figure 59 Intrusion > Top Destinations ............................................................................... 126
Figure 61 Network Attack > Intrusion > By Severity ............................................................ 130
Figure 62 Network Attack > Intrusion > By Severity > Drill-Down ....................................... 132
Figure 63 Network Attack > AntiVirus > Summary .............................................................. 134
Figure 64 Network Attack > AntiVirus > Summary > Drill-Down ......................................... 136
Figure 65 Network Attack > AntiVirus > Top Viruses ........................................................... 138
Figure 66 Network Attack > AntiVirus > Top Viruses > Drill-Down ...................................... 140
Figure 67 Network Attack > AntiVirus > Top Sources ......................................................... 142
Figure 68 Network Attack > AntiVirus > Top Sources > Drill-Down ..................................... 144
Figure 69 Network Attack > AntiVirus > Top Destinations ................................................... 146
Figure 70 Network Attack > AntiSpam > Summary ............................................................. 148
Figure 71 Network Attack > AntiSpam > Summary > Drill-Down ........................................ 150
Figure 72 Network Attack > AntiSpam > Top Senders ........................................................ 152
Figure 73 Network Attack > AntiSpam > Top Sources ........................................................ 154
Figure 74 Network Attack > AntiSpam > By Score .............................................................. 156
Figure 75 Security Policy > WEB Blocked > Summary ....................................................... 159
Figure 77 Security Policy > WEB Blocked > Top Sites ....................................................... 162
Figure 79 Security Policy > WEB Blocked > Top Hosts ...................................................... 166
13
List of Figures

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents