Top Intrusion Sources - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Chapter 7 Network Attack
Table 91 Network Attack > Intrusion > Top Intrusions > Drill-Down
LABEL
Color
Intrusions
% of Intrusions
View Logs
Total
Back

7.2.5 Top Intrusion Sources

Use this report to look at the top sources of intrusions by number of intrusions.
To look at intrusion reports, each ZyXEL device must record intrusions in its
log. See the User's Guide for each ZyXEL device for more information. In most
devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go to
IDP > Signature, and make sure the ZyXEL device logs each Attack Type you
want to see in Vantage Report.
Click Network Attack > Intrusion > Top Sources to open this screen.
206
DESCRIPTION
This field displays what color represents each source in the graph.
This field displays the number of intrusions by each source.
This field displays what percentage of all intrusions using the selected intrusion
signature was made by each source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above. If the number of sources of
the selected intrusion signature is greater than the maximum number of records
displayed in this table, this total might be a little lower than the total in the main
report.
Click this to return to the main report.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents