Top Intrusion Signatures Drill-Down; Figure 97 Network Attack > Intrusion > Top Intrusions > Drill-Down; Table 91 Network Attack > Intrusion > Top Intrusions > Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

7.2.4 Top Intrusion Signatures Drill-Down

Use this report to look at the top sources of intrusions for any top signature.
Click on a specific intrusion signature in Network Attack > Intrusion > Top Intrusions to
open this screen.
Figure 97 Network Attack > Intrusion > Top Intrusions > Drill-Down
Each field is described in the following table.
Table 91 Network Attack > Intrusion > Top Intrusions > Drill-Down
LABEL
title
graph
Source
Vantage Report User's Guide
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top sources of the selected intrusion signature, sorted by
the number of intrusions by each one. If the number of sources is less than the
maximum number of records displayed in this table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled in
System > General Configuration, the table displays the domain name, if
identifiable, with the IP address (for example, "www.yahoo.com/
200.100.20.10").
Chapter 7 Network Attack
205

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents