Figure 89 Network Attack > Attack > Top Attacks > Drill-Down; Table 83 Network Attack > Attack > Top Attacks > Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Chapter 7 Network Attack
Figure 89 Network Attack > Attack > Top Attacks > Drill-Down
Each field is described in the following table.
Table 83 Network Attack > Attack > Top Attacks > Drill-Down
LABEL
title
graph
Source
Color
Attacks
% of Attacks
View Logs
192
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top senders of the selected category of DoS attacks.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks in the selected category that
came from each source.
This field displays what percentage of all DoS attacks in the selected category
came from each source.
Click this icon to see the logs that go with the record.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents