Top Attack Sources Drill-Down - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 7 Network Security
Table 117 Report > Network Security > Attack > Top Sources
LABEL
Source
Color
Attacks
% of Attacks
View Logs
Total

7.2.6 Top Attack Sources Drill-Down

Use this report to look at the top categories of DoS attacks for any top source.
286
DESCRIPTION
This field displays the top sources of DoS attacks in the selected
device, sorted by the number of attacks by each one. If the number
of sources is less than the maximum number of records displayed in
this table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled
in System > General Configuration, the table displays the domain
name, if identifiable, with the IP address (for example,
"www.yahoo.com/200.100.20.10").
Click on a source to look at the top categories of DoS attacks by the
selected source.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks by each source.
This field displays what percentage of all DoS attacks was made by
each source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents