Secure Remote Access - Client-To-Site (Ipsec) - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 6 Secure Remote Access
Each field is described in the following table.
Table 90 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Destinations
> Drill-Down
LABEL
graph
Host
Color
Sessions
% of Sessions
MBytes
Transferred
% of MBytes
Transferred
View Logs
Total
Back
6.2 Secure Remote Access - Client-to-Site
(IPSec)
Secure Remote Access tunnels with the remote gateway set as any are called
dynamic tunnels (only the remote device can initiate a dynamic IPSec Secure
Remote Access tunnel). Devices can use xauth to authenticate remote users (by
username and password) when they try to initiate a dynamic Secure Remote
Access tunnel. The Secure Remote Access remote access screens display statistics
for remote users that use dynamic Secure Remote Access tunnels and have been
authenticated by xauth.
222
DESCRIPTION
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top senders or receivers of Secure Remote
Access traffic using the selected service, sorted by the amount of
traffic attributed to each one.
Each source is identified by its IP address. If Hostname Reverse is
enabled in System > General Configuration, the table displays the
host name, if identifiable, with the IP address.
This field displays what color represents each host in the graph.
This field displays the number of traffic events of each host.
This field displays what percentage each host's number of traffic
events makes out of the total number of traffic events for the selected
Secure Remote Access traffic.
This field displays how much traffic (in megabytes) was handled
through the Secure Remote Access tunnels for each host.
This field displays what percentage of the selected Secure Remote
Access traffic belonged to each host.
Click this icon to see the logs that go with the record.
This entry displays the totals for the services above. By default, only
the top hosts are displayed. You can change the number of hosts to
be displayed through the TopN setting in Settings.
Click this to return to the main report.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents