ZyXEL Communications Vantage CNM User Manual page 33

Centralized network management
Hide thumbs Also See for Vantage CNM:
Table of Contents

Advertisement

Vantage CNM User's Guide
Table 166 Top Users of Web Services ............................................................................... 346
Table 167 Top Users of FTP Services ................................................................................ 347
Table 168 Top Users of Mail Services ................................................................................ 348
Table 169 Top Users of VPN Tunnels ................................................................................ 350
Table 170 Top Users of Custom Services .......................................................................... 351
Table 171 Web Filter Summary .......................................................................................... 352
Table 172 Web Filter Top Sites .......................................................................................... 353
Table 173 Web Filter Top Users ......................................................................................... 355
Table 174 Web Filter By User ............................................................................................ 356
Table 175 Attack Summary ................................................................................................ 358
Table 176 Attack Categories .............................................................................................. 359
Table 177 Source of Attacks .............................................................................................. 361
Table 178 Attack Errors and Exceptions ............................................................................ 362
Table 179 Successful Logins .............................................................................................. 364
Table 180 Failed Logins ..................................................................................................... 365
Table 181 Log Monitor ........................................................................................................ 367
Table 182 Log Search ........................................................................................................ 369
Table 183 General System Configuration .......................................................................... 370
Table 184 Schedule Reports .............................................................................................. 371
Table 185 Schedule Daily Reports ..................................................................................... 372
Table 186 Schedule Daily Reports ..................................................................................... 374
Table 187 Daily Reports ..................................................................................................... 377
Table 188 Over Time Report .............................................................................................. 379
Table 189 FTP and syslog Server Overview ...................................................................... 402
Table 190 Classes of IP Addresses ................................................................................... 408
Table 191 Allowed IP Address Range By Class ................................................................. 409
Table 192 "Natural" Masks ................................................................................................ 409
Table 193 Alternative Subnet Mask Notation ..................................................................... 410
Table 194 Two Subnets Example ....................................................................................... 410
Table 195 Subnet 1 ............................................................................................................ 411
Table 196 Subnet 2 ............................................................................................................ 411
Table 197 Subnet 1 ............................................................................................................ 412
Table 198 Subnet 2 ............................................................................................................ 412
Table 199 Subnet 3 ............................................................................................................ 412
Table 200 Subnet 4 ............................................................................................................ 413
Table 201 Eight Subnets .................................................................................................... 413
Table 202 Class C Subnet Planning ................................................................................... 413
Table 203 Class B Subnet Planning ................................................................................... 414
Table 204 IEEE802.11g ...................................................................................................... 422
Table 205 Comparison of EAP Authentication Types ......................................................... 426
Table 206 Wireless Security Relational Matrix ................................................................... 427
Table 207 System Maintenance Logs ................................................................................ 432
Table 208 System Error Logs ............................................................................................. 433
List of Tables
32

Advertisement

Table of Contents
loading

Table of Contents