ZyXEL Communications Vantage Report User Manual page 12

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Table of Contents
6.1.8 Top Secure Remote Access Tunnels Drill-Down ...................................................... 199
6.1.9 Top Secure Remote Access Protocols ..................................................................... 201
6.1.10 Top Secure Remote Access Protocols Drill-Down ................................................. 204
6.1.11 Top Secure Remote Access Hosts ......................................................................... 206
6.1.12 Top Secure Remote Access Hosts Drill-Down ....................................................... 210
6.1.13 Top Secure Remote Access Users ........................................................................ 212
6.1.14 Top Secure Remote Access Users Drill-Down ....................................................... 215
6.1.15 Top Secure Remote Access Destinations .............................................................. 217
6.1.16 Top Secure Remote Access Destinations Drill-Down ............................................ 220
6.2 Secure Remote Access - Client-to-Site (IPSec) ................................................................ 222
6.2.1 Secure Remote Access User Status ........................................................................ 223
6.2.2 Secure Remote Access User Status Drill-Down ...................................................... 225
6.2.3 Top Secure Remote Access Protocols ..................................................................... 227
6.2.4 Top Secure Remote Access Protocols Drill-Down ................................................... 230
6.2.5 Top Secure Remote Access Destinations ................................................................ 232
6.2.6 Top Secure Remote Access Destinations Drill-Down .............................................. 235
6.2.7 Secure Remote Access Top Users .......................................................................... 237
6.2.8 Secure Remote Access Top Users Drill-Down ......................................................... 240
6.3 Secure Remote Access - Client-to-Site (SSL) ................................................................... 242
6.3.1 Secure Remote Access User Status ........................................................................ 243
6.3.2 Secure Remote Access User Status Drill-Down ...................................................... 245
6.3.3 Top Secure Remote Access Protocols ..................................................................... 246
6.3.4 Top Secure Remote Access Protocols Drill-Down ..............................................................249
6.3.5 Top Secure Remote Access Destinations ................................................................ 251
6.3.6 Top Secure Remote Access Destinations Drill-Down .............................................. 254
6.3.7 Top Secure Remote Access Applications ................................................................ 256
6.3.8 Top Secure Remote Access Applications Drill-Down ............................................... 259
6.3.9 Secure Remote Access Top Users .......................................................................... 261
6.3.10 Secure Remote Access Top Users Drill-Down ....................................................... 263
6.4 Xauth ................................................................................................................................. 265
6.4.1 Secure Remote Access Successful Login ............................................................... 265
6.4.2 Secure Remote Access Failed Login ....................................................................... 267
Network Security................................................................................................................... 269
7.1 Firewall Access Control ..................................................................................................... 269
7.1.1 Top Users Blocked ................................................................................................... 269
7.1.2 Top Packets Blocked ................................................................................................ 272
7.2 Attack ................................................................................................................................. 275
7.2.1 Attack Summary ....................................................................................................... 275
7.2.2 Attack Summary Drill-Down ..................................................................................... 278
7.2.3 Top Attacks ............................................................................................................... 279
7.2.4 Top Attacks Drill-Down ............................................................................................. 282
12
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents