Zyxel Device Configuration And Source Data; Table 3 Zynos-Based Zyxel Device Configuration Requirements By Menu Item - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Table 2 Processing Times by Menu Item
MENU ITEM
Traffic, Network Attack, Security Policy, Authentication
Log Viewer > All Logs

2.4 ZyXEL Device Configuration and Source Data

The following table identifies the configuration required in ZyXEL devices for each
screen in Vantage Report.

Table 3 ZyNOS-based ZyXEL Device Configuration Requirements by Menu Item

MENU ITEM(S)
Monitor > Bandwidth
Monitor > Service
Monitor > Attack
Monitor > Intrusion
Monitor > AntiVirus
Monitor > AntiSpam
Traffic
VPN
Network Attack > Attack
Network Attack > Intrusion
Network Attack > AntiVirus
Network Attack > AntiSpam
Security Policy > Firewall
Access Control
Security Policy > Application
Access Control
Security Policy > WEB Blocked log entries
Security Policy > WEB Allowed
Event > Login
Event > Session Per Host
Log Viewer > All Logs
* - The names of categories may be different for different devices. Use the category that is appropriate for each
device.
** - The log viewers display whatever log entries the ZyXEL devices record, including log entries that may not
be used in other reports.
Vantage Report User's Guide
Chapter 2 The Vantage Report Server
SOURCE
LOG SETTINGS*
DATA
traffic statistics
--
traffic statistics
--
log entries
Attack
log entries
IDP
log entries
Anti-Virus
log entries
Anti-Spam
traffic statistics
--
log entries
IPSec
log entries
Attack
log entries
IDP
log entries
Anti-Virus
log entries
Anti-Spam
log entries
Access Control
N/A
N/A
Blocked Web Sites
log entries
Forward Web Sites
log entries
System Maintenance
log entries
Access Control
log entries
**
TIME
(MIN)
5
5
ADDITIONAL
--
--
--
IDP > Signature
Anti-Virus > General
--
--
--
--
IDP > Signature
Anti-Virus > General
--
--
N/A
--
--
--
--
**
35

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents