Top Intrusion Destinations Drill-Down; Figure 101 Network Attack > Intrusion > Top Destinations > Drill-Down; Table 95 Network Attack > Intrusion > Top Destinations > Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Chapter 7 Network Attack

7.2.8 Top Intrusion Destinations Drill-Down

Use this report to look at the top intrusion signatures for any top destination.
Click on a specific destination in Network Attack > Intrusion > Top Destinations to open
this screen.
Figure 101 Network Attack > Intrusion > Top Destinations > Drill-Down
Each field is described in the following table.
Table 95 Network Attack > Intrusion > Top Destinations > Drill-Down
LABEL
title
graph
Intrusion Signature
Color
Severity
Type
212
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the top intrusion signatures sent to the selected destination,
sorted by the number of intrusions at each one.
This field displays what color represents each intrusion signature in the graph.
This field displays the severity of each intrusion signature.
This field displays what kind of intrusion each intrusion signature is. This
corresponds to IDP > Signature > Attack Type in most ZyXEL devices.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents