Figure 91 Network Attack > Attack > Top Sources > Drill-Down; Table 85 Network Attack > Attack > Top Sources > Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Chapter 7 Network Attack
Figure 91 Network Attack > Attack > Top Sources > Drill-Down
Each field is described in the following table.
Table 85 Network Attack > Attack > Top Sources > Drill-Down
LABEL
title
graph
Attack
Color
Attacks
% of Attacks
View Logs
196
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top categories of DoS attacks from the selected source,
sorted by the number of attacks by each one.
This field displays what color represents each category in the graph.
This field displays the number of DoS attacks from each category that occurred
from the selected source.
This field displays what percentage of all DoS attacks from the selected source
comes from each category.
Click this icon to see the logs that go with the record.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents