ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual page 18

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
Table 38 Traffic > Customization > Top Destinations ......................................................... 94
Table 40 Traffic > Customization > Top Sources ................................................................ 98
Table 41 Traffic > Customization > Top Sources > Drill-Down ........................................... 99
Table 42 Network Attack > Attack > Summary ................................................................... 103
Table 43 Network Attack > Attack > Summary > Drill-Down .............................................. 105
Table 44 Network Attack > Attack > Top Sources .............................................................. 107
Table 45 Network Attack > Attack > Top Sources > Drill-Down .......................................... 108
Table 46 Network Attack > Attack > By Category .............................................................. 110
Table 47 Network Attack > Attack > By Category > Drill-Down .......................................... 112
Table 48 Network Attack > Intrusion > Summary ............................................................... 114
Table 49 Network Attack > Intrusion > Summary > Drill-Down .......................................... 116
Table 50 Network Attack > Intrusion > Top Intrusions ........................................................ 118
Table 52 Network Attack > Intrusion > Top Sources .......................................................... 122
Table 53 Network Attack > Intrusion > Top Sources > Drill-Down ...................................... 124
Table 54 Intrusion > Top Destinations ................................................................................ 126
Table 56 Network Attack > Intrusion > By Severity ............................................................ 130
Table 57 Network Attack > Intrusion > By Severity > Drill-Down ........................................ 132
Table 58 Network Attack > AntiVirus > Summary ............................................................... 134
Table 59 Network Attack > AntiVirus > Summary > Drill-Down .......................................... 136
Table 60 Network Attack > AntiVirus > Top Viruses ........................................................... 138
Table 61 Network Attack > AntiVirus > Top Viruses > Drill-Down ...................................... 140
Table 62 Network Attack > AntiVirus > Top Sources .......................................................... 142
Table 63 Network Attack > AntiVirus > Top Sources > Drill-Down ..................................... 144
Table 64 Network Attack > AntiVirus > Top Destinations ................................................... 146
Table 65 Network Attack > AntiSpam > Summary ............................................................. 148
Table 66 Network Attack > AntiSpam > Summary > Drill-Down ......................................... 150
Table 67 Network Attack > AntiSpam > Top Senders ......................................................... 152
Table 68 Network Attack > AntiSpam > Top Sources ......................................................... 154
Table 69 Network Attack > AntiSpam > By Score .............................................................. 156
Table 70 Security Policy > WEB Blocked > Summary ....................................................... 159
Table 72 Security Policy > WEB Blocked > Top Sites ........................................................ 163
Table 74 Security Policy > WEB Blocked > Top Hosts ....................................................... 166
Table 76 Security Policy > WEB Blocked > By Category ................................................... 170
Table 78 Security Policy > WEB Allowed > Summary ........................................................ 173
17
List of Tables

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents