ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual page 8

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

Vantage Report User's Guide
4.5 Anti-Virus Monitor ...............................................................................................48
4.6 Anti-Spam Monitor ..............................................................................................49
Traffic ...................................................................................................................... 52
5.1 Bandwidth ..........................................................................................................52
5.2 Web Traffic .........................................................................................................63
5.3 FTP Traffic ..........................................................................................................70
5.4 Mail Traffic ..........................................................................................................77
5.5 VPN Traffic .........................................................................................................84
5.6 Other Traffic .......................................................................................................92
Network Attack ..................................................................................................... 102
6.1 Attack ...............................................................................................................102
7
5.1.1 Bandwidth Summary..................................................................................52
5.1.2 Bandwidth Summary Drill-Down ................................................................54
5.1.3 Bandwidth Top Protocols ...........................................................................56
5.1.4 Bandwidth Top Protocols Drill-Down..........................................................58
5.1.5 Top Bandwidth Hosts .................................................................................60
5.1.6 Top Bandwidth Hosts Drill-Down ...............................................................62
5.2.1 Top Web Sites............................................................................................63
5.2.2 Top Web Sites Drill-Down ..........................................................................65
5.2.3 Top Web Hosts ..........................................................................................67
5.2.4 Top Web Hosts Drill-Down .........................................................................68
5.3.1 Top FTP Sites ............................................................................................70
5.3.2 Top FTP Sites Drill-Down...........................................................................72
5.3.3 Top FTP Hosts ...........................................................................................74
5.3.4 Top FTP Hosts Drill-Down .........................................................................75
5.4.1 Top Mail Sites ............................................................................................77
5.4.2 Top Mail Sites Drill-Down...........................................................................79
5.4.3 Top Mail Hosts ...........................................................................................81
5.4.4 Top Mail Hosts Drill-Down..........................................................................82
5.5.1 Top VPN Peer Gateways ...........................................................................84
5.5.2 Top VPN Peer Gateways Drill-Down .........................................................86
5.5.3 Top VPN Hosts ..........................................................................................88
5.5.4 Top VPN Hosts Drill-Down.........................................................................90
5.6.1 Service Settings.........................................................................................92
5.6.2 Top Destinations of Other Traffic ...............................................................93
5.6.3 Top Destinations of Other Traffic Drill-Down..............................................95
5.6.4 Top Sources of Other Traffic ......................................................................97
5.6.5 Top Sources of Other Traffic Drill-Down ....................................................99
6.1.1 Attack Summary ......................................................................................102
Table of Contents

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents