Top Intrusion Signatures; Figure 96 Network Attack > Intrusion > Top Intrusions - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Table 89 Network Attack > Intrusion > Summary > Drill-Down
LABEL
Total
Back

7.2.3 Top Intrusion Signatures

Use this report to look at the top intrusion signatures by number of intrusions.
To look at intrusion reports, each ZyXEL device must record intrusions in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go to
IDP > Signature, and make sure the ZyXEL device logs each Attack Type you
want to see in Vantage Report.
Click Network Attack > Intrusion > Top Intrusions to open this screen.
Figure 96 Network Attack > Intrusion > Top Intrusions
Vantage Report User's Guide
DESCRIPTION
This entry displays the totals for the intrusion signatures above.
Click this to return to the main report.
Chapter 7 Network Attack
203

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents