Top Secure Remote Access Protocols Drill-Down - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 6 Secure Remote Access
Table 93 Report > Secure Remote Access > Client-to-Site (IPSec) > Top Protocols
LABEL
Protocol
Color
Sessions
% of Sessions
MBytes
Transferred
% of MBytes
Transferred
View Logs
Total

6.2.4 Top Secure Remote Access Protocols Drill-Down

Use this report to look at the top remote access senders or receivers of any top
service.
230
DESCRIPTION
This field displays the services most used by remote access Secure
Remote Access traffic in the selected device, sorted by the amount of
traffic for each one. If the number of protocols is less than the
maximum number of records displayed in this table, every protocol is
displayed.
Each protocol is identified by its name. Click on a protocol to look at
the top senders or receivers of the service through Secure Remote
Access.
This field displays what color represents each protocol in the graph.
This field displays the number of traffic events for each protocol.
This field displays what percentage each protocol's number of traffic
events makes out of the total number of traffic events that match the
settings you displayed in this report.
This field displays how much traffic (in megabytes) the device
handled for each protocol.
This field displays what percentage of Secure Remote Access traffic
the device handled for each protocol.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents