Top Attack Sources - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Each field is described in the following table.
Table 116 Report > Network Security > Attack > Top Attacks > Drill-Down
LABEL
graph
Source
Color
Attacks
% of Attacks
View Logs
Total
Back

7.2.5 Top Attack Sources

Use this report to look at the top sources of DoS attacks by number of attacks.
Note: To look at attack reports, each ZyXEL device must record DoS attacks in its log.
See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure Attacks is enabled.
Vantage Report User's Guide
DESCRIPTION
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top senders of the selected category of DoS
attacks.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks in the selected category
that came from each source.
This field displays what percentage of all DoS attacks in the selected
category came from each source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above. If the number of
sources of the selected category of DoS attacks is greater than the
maximum number of records displayed in this table, this total might
be a little lower than the total in the main report.
Click this to return to the main report.
Chapter 7 Network Security
283

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents