Secure Remote Access Top Users - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Each field is described in the following table.
Table 96 Report > Secure Remote Access > Client-to-Site (IPSec) > Top
Destinations > Drill-Down
LABEL
graph
Host
Color
Sessions
% of Sessions
MBytes
Transferred
% of MBytes
Transferred
View Logs
Total
Back

6.2.7 Secure Remote Access Top Users

Use this report to look at the users that send or receive the most Secure Remote
Access traffic.
Vantage Report User's Guide
DESCRIPTION
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top sources that sent remote access Secure
Remote Access traffic to the selected destination, sorted by the
amount of traffic attributed to each one.
Each source is identified by its IP address. If Hostname Reverse is
enabled in System > General Configuration, the table displays the
host name, if identifiable, with the IP address.
This field displays what color represents each host in the graph.
This field displays the number of traffic events of each host.
This field displays what percentage each host's number of traffic
events makes out of the total number of traffic events for the selected
Secure Remote Access traffic.
This field displays how much traffic (in megabytes) was handled
through the Secure Remote Access tunnels for each host.
This field displays what percentage of the selected Secure Remote
Access traffic belonged to each host.
Click this icon to see the logs that go with the record.
This entry displays the totals for the hosts above. By default, only the
top 10 hosts are displayed. You can change the number of hosts to be
displayed through the TopN setting in Settings.
Click this to return to the main report.
Chapter 6 Secure Remote Access
237

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents