Figure 103 Network Attack > Intrusion > By Severity > Drill-Down; Table 97 Network Attack > Intrusion > By Severity > Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Chapter 7 Network Attack
Figure 103 Network Attack > Intrusion > By Severity > Drill-Down
Each field is described in the following table.
Table 97 Network Attack > Intrusion > By Severity > Drill-Down
LABEL
title
graph
Intrusion Signature
Color
Severity
Type
Intrusions
% of Intrusions
View Logs
216
DESCRIPTION
This field displays the title of the drill-down report. The title includes the date(s)
you specified in the Last Days or Settings fields.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays the intrusion signatures of the selected severity, sorted by the
number of intrusions by each one.
This field displays what color represents each intrusion signature in the graph.
This field displays the severity of each intrusion signature.
This field displays what kind of intrusion each intrusion signature is. This
corresponds to IDP > Signature > Attack Type in most ZyXEL devices.
This field displays the number of intrusions of the selected severity using each
intrusion signature.
This field displays what percentage of all intrusions of the selected severity was
made by each intrusion signature.
Click this icon to see the logs that go with the record.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents