ZyXEL Communications Vantage Report User Manual page 46

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 3 The Web Configurator
Table 10 Menu Panel
LEVEL 1/2
LEVEL 3
User Status
Top
Protocols
Top
Destinations
Top
Applications
Top Users
Xauth
Successful
Login
Failed Login
Network
Security
Firewall Access
Control
Top Users
Blocked
Top Packets
Blocked
Attack
Summary
Top Attacks
Top Sources
By Type
Intrusion Hits
46
FUNCTION
Use this report to see which of the device's remote access users
are connected.
Use this report to display which services the remote access users
used the most. You can also use this report to look at the top
remote access senders or receivers of any top service.
Use this report to look at where the remote SSL VPN users sent
the most traffic. You can also use this report to look at the remote
access hosts that sent the most traffic to the selected top
destination.
Use this report to display which SSL VPN applications the remote
access users accessed the most. You can also use this report to
look at the top remote access senders or receivers of any top
application.
Use this report to look at the users that send or receive the most
VPN traffic. You can also use this report to look at the services
sent through VPN from or to a top user.
Use this report to monitor the total number of users that have
successfully logged in to use one of the device's VPN tunnels.
Use this report to monitor the total number of users that have
made unsuccessful attempts to log in to use one of the device's
VPN tunnels.
Use this report to look at the users from which the device blocked
the most traffic.
Use this report to look at the firewall rule that blocked the most
packets.
Use these reports to look at Denial-of-Service (DoS) attacks that
were detected by the ZyXEL device's firewall.
Use this report to look at the number of DoS attacks by time
interval. You can also use this report to look at the top categories
of DoS attacks in a specific time interval.
Use this report to look at the top kinds of DoS attacks by number
of attacks. You can also use this report to look at the top
categories of DoS attacks for any top source.
Use this report to look at the top sources of DoS attacks by
number of attacks. You can also use this report to look at the top
categories of DoS attacks for any top source.
Use this report to look at the top categories of DoS attacks by
number of attacks. You can also use this report to look at the top
sources of DoS attacks for any top category.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents