Dell SonicWALL GX250 Manual page 183

Table of Contents

Advertisement

The Top Sources of Attacks report displays a pie chart of the top 10 sources by the
number of attacks. The report table lists the top 10 sources displayed in the chart, the
number of attacks generated by the source, and the number of attacks as a percentage
of the total attacks during the report period.
Number of Attacks by Category
The Number of Attacks by Category report presents attacks against the SonicWALL by
category over the report period. Attack categories include IP spoof, Ping of Death, SYN
flood, land, smurf, probe, and Trojan.
The Number of Attacks by Category report displays a pie chart of the top attack
categories by number of attacks. The report table lists the top 10 attack categories
displayed in the chart, the number of attacks for the category, and the number of
attacks for the category as a percentage of the total attacks during the report period.
Dropped Packets
The Dropped Packets report displays all IP packets dropped by your SonicWALL. IP
packets dropped by the SonicWALL include: TCP Packets, UDP Packets, ICMP Packets,
IPSec Packets, PPTP Packets, Broadcast Packets, and Fragmented Packets. The
Dropped Packets report includes blocked NetBIOS packets and other normal Internet
activity and it also signals unusual or suspicious connection attempts.
The Dropped Packets Report displays a bar graph of the number of IP packets dropped
by the SonicWALL. The table displays the hour of the day, the number of dropped
packets during the hour and the number of dropped packets as a percentage of the
total dropped packets during the report period.
SonicWALL Internet Security Appliance Guide Page 183

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sonicwall gx650

Table of Contents