ZyXEL Communications Vantage Report User Manual page 258

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 6 Secure Remote Access
Table 105 Report > Secure Remote Access > Client-to-Site (SSL) > Top
Applications
LABEL
Settings
graph
Application
Type
258
DESCRIPTION
Use these fields to specify what historical information is included in
the report. Click the settings icon. The Report Display Settings
screen appears.
Select a specific Start Date and End Date. The date range can be up
to 30 days long, but you cannot include days that are older than
Store Log Days in System > General Configuration.
The User and Direction fields are the same as in the main screen.
Select MBytes Transferred to sort the records by the amount of
traffic. Select Sessions to sort by the number of sessions.
TopN: select the number of records that you want to display. For
example, select 10 to display the first 10 records.
Keyword: enter part or all of any value you want to look for in the
Application field. You can use any printable ASCII characters except
the ' and %. The search is case-insensitive.
Click Apply to update the report immediately, or click Cancel to close
this screen.
These fields reset to the default values when you click a menu item in
the menu panel (including the menu item for the same report). The
fields do not reset when you open or close drill-down reports.
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the internal services the remote users access the
most through SSL Secure Remote Access, sorted by the amount of
traffic for each one. If the number of applications is less than the
maximum number of records displayed in this table, every application
is displayed.
Each application is identified by its name. Click on an application to
look at the top remote user's hosts of Secure Remote Access traffic
for the selected application.
This field displays what kind of service the internal server provides.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents