Top Attack Sources Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Table 84 Network Attack > Attack > Top Sources
LABEL
Settings
graph
Source
Color
Attacks
% of Attacks
View Logs
Total

7.1.6 Top Attack Sources Drill-Down

Use this report to look at the top categories of DoS attacks for any top source.
Click on a specific source in Network Attack > Attack > Top Sources to open this screen.
Vantage Report User's Guide
DESCRIPTION
Use these fields to specify what historical information is included in the report.
Click the settings icon. The Report Display Settings screen appears.
Select a specific Start Date and End Date. The date range can be up to 30
days long, but you cannot include days that are older than Store Log Days in
System > General Configuration. Click Apply to update the report
immediately, or click Cancel to close this screen without any changes.
TopN: select the number of records that you want to display. For example,
select 10 to display the first 10 records.
These fields reset to the default values when you click a menu item in the
function window (including the menu item for the same report). It does not reset
when you open or close drill-down reports.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top sources of DoS attacks in the selected device, sorted
by the number of attacks by each one. If the number of sources is less than the
maximum number of records displayed in this table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled in
System > General Configuration, the table displays the domain name, if
identifiable, with the IP address (for example, "www.yahoo.com/
200.100.20.10").
Click on a source to look at the top categories of DoS attacks by the selected
source. The Top Attack Sources Drill-Down report appears.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks by each source.
This field displays what percentage of all DoS attacks was made by each
source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above.
Chapter 7 Network Attack
195

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents