About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Vantage Report using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Page 4
• Product model and serial number. • Warranty Information. • Date that you received your device. • Brief description of the problem and the steps you took to solve it. Vantage Report User’s Guide...
Syntax Conventions • The version number on the title page is the version of Vantage Report that is documented in this User’s Guide. • Enter means for you to type one or more characters and press the carriage return.
Page 6
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. Vantage Report User’s Guide...
1.3 Hardware Requirements ...................... 22 Chapter 2 The Vantage Report Server ....................23 2.1 Starting and Stopping the Vantage Report Server ............... 23 2.2 E-Mail in the Vantage Report Server ................... 24 2.3 Time in the Vantage Report Server ..................25 2.4 Common Terms ........................
Page 10
5.1.3 Bandwidth Top Protocols ..................100 5.1.4 Bandwidth Top Protocols Drill-Down ................ 104 5.1.5 Top Bandwidth Hosts ....................106 5.1.6 Top Bandwidth Hosts Drill-Down ................110 5.1.7 Top Bandwidth Users ....................112 5.1.8 Top Bandwidth Users Drill-Down ................115 Vantage Report User’s Guide...
Page 11
6.1.3 Top VPN Peer Gateways ..................186 6.1.4 Top VPN Peer Gateways Drill-Down ................ 189 6.1.5 Top Secure Remote Access Sites ................191 6.1.6 Top Secure Remote Access Sites Drill-Down ............194 6.1.7 Top Secure Remote Access Tunnels ............... 196 Vantage Report User’s Guide...
Page 12
7.1.1 Top Users Blocked ....................269 7.1.2 Top Packets Blocked ....................272 7.2 Attack ..........................275 7.2.1 Attack Summary ....................... 275 7.2.2 Attack Summary Drill-Down ..................278 7.2.3 Top Attacks ....................... 279 7.2.4 Top Attacks Drill-Down ..................... 282 Vantage Report User’s Guide...
Page 17
Appendix A Product Specifications..................589 Appendix B ZyWALL USG Series and ZyWALL 1050 Log Descriptions ......599 Appendix C ZyNOS Log Descriptions .................. 645 Appendix D Open Software Announcements ............... 671 Appendix E Legal Information ....................709 Index............................711 Vantage Report User’s Guide...
Page 18
Table of Contents Vantage Report User’s Guide...
In this example, you use the web configurator (A) to set up the Vantage Report server (B). You also configure the ZyXEL devices (C) to send their logs and traffic statistics to the Vantage Report Server. The Vantage Report server collects this information. Then, you can •...
Vantage Report, you get the basic version. Note: This User’s Guide discusses the features in the full version. Register Vantage Report to use the full version to manage one device. Purchase E- Vantage Report license keys to add more devices. See Section 14.5 on page 558...
2.1 Starting and Stopping the Vantage Report Server Note: Make sure the port Vantage Report uses for web services is not used by other applications, especially web servers. The Vantage Report server runs as a service on the Vantage Report server. By default, this service starts automatically when you log in to the Vantage Report server.
Select Start or Stop to start or stop the Vantage Report service. Select Properties to configure the service. 2.2 E-Mail in the Vantage Report Server Note: Before the Vantage Report server can send e-mail to anyone, you have to configure the SMTP mail server. See Section 14.2 on page 554 for more information.
(log entries or traffic statistics) from the ZyXEL devices, not the time the device puts in the entry. As soon as the Vantage Report server receives information, it replaces device times with the current time in the Vantage Report server.
Page 26
Chapter 2 The Vantage Report Server TERM DESCRIPTION Drill-down Report Click a link in a report to display details in another screen. For example, click Secure Remote Access > Client-to-Site (IPSec) > User Status, then click a user’s link to display a report of the services for which the user sent the most traffic.
Chapter 2 The Vantage Report Server 2.5 Common Icons The following table describes common icons. Table 4 Common Icons ICON DESCRIPTION The View Detail icon (in the Dashboard) lets you focus on an individual monitor report. The Settings icons open a screen where you can modify the report display settings.
Page 28
Chapter 2 The Vantage Report Server Table 5 ZLD-based (USG Series and ZyWALL 1050) Configuration Requirements by Menu Item USG SERIES AND ZYWALL 1050 VANTAGE REPORT MENU ITEM(S) SOURCE ADDITIONAL DATA SETTINGS* Monitor > Secure Remote Access > Client- log entries...
Page 29
Chapter 2 The Vantage Report Server Table 5 ZLD-based (USG Series and ZyWALL 1050) Configuration Requirements by Menu Item USG SERIES AND ZYWALL 1050 VANTAGE REPORT MENU ITEM(S) SOURCE ADDITIONAL DATA SETTINGS* Report > Network Security > Intrusion log entries Hits Report >...
Page 30
• Log Settings - If ZyXEL devices do not record some categories of log entries, Vantage Report does not have any information to display either. For example, if you want to look at VPN traffic for a particular device, the device has to record log entries for IPSec.
Page 31
Chapter 2 The Vantage Report Server Vantage Report User’s Guide...
Page 32
Chapter 2 The Vantage Report Server Vantage Report User’s Guide...
The web configurator is a browser-based interface that you can use to set up, manage, and use Vantage Report. You can run it on the Vantage Report server or on a different computer. Your web browser should meet the following requirements: •...
Page 34
Figure 6 Web Configurator Login Screen Note: If you forget your password, enter your user name, and click Forget Password?. Vantage Report sends your password to the e-mail address (if any) for your User Name. See Section 2.2 on page 24...
Page 35
Click the Login button. The System Dashboard screen appears. See Section 3.6.1 on page 53 for the field descriptions in this screen. Figure 7 Dashboard Manually add a device to Vantage Report. See Table 8 on page 38 for how to add a device. Vantage Report User’s Guide...
Page 36
• The report and setting window (D) - shows the selected report for the selected device(s) or the related setting screens. Note: For security reasons, Vantage Report automatically times out after fifteen minutes of inactivity. Log in again if this happens.
Vantage Report, and remove devices from Vantage Report. Note: You have to add the device to the device window if you want Vantage Report to store log or traffic information from this device. If the Vantage Report server receives logs or traffic information from a device that is not in this list, it discards the logs.
Page 38
Each numbered section above is described in the following table. Table 8 Device Window SECTION DESCRIPTION To add a device to Vantage Report, • right click on root, and select Add Device. The Add Device screen appears in the device window. (See Figure 11.)
Page 39
You can click the magnifying glass again to look for another match. When you add a device to Vantage Report, you can specify the name, MAC address, type, and any notes for the device. When you click on the device, this information is displayed in the report and setting window (see Section 3.6.1 on...
Page 40
1-28 characters long. This name is used to refer to the device (or folder) in Vantage Report, and it has to be different than other device (or folder) names in Vantage Report. You can use the system name of a device as the name for that device.
Table 10 expands the menu panel and introduces each monitor, statistical report, and screen. In addition, it also indicates if you can drill down into each statistical report. Vantage Report User’s Guide...
Page 42
Note: Not every report (or fields in a report) is available with every model of device and firmware version. See Table 267 on page 591 for a list of which items Vantage Report supports with various firmware versions of various devices. Table 10 Menu Panel LEVEL 1/2 LEVEL 3...
Page 43
Top Users Use this report to look at the top users generating traffic through the selected device. You can also use this report to look at the top services used by any top bandwidth user. Vantage Report User’s Guide...
Page 44
Use this report to look at the top sources of traffic for other services. You can also use this report to look at the top destinations of other services’ traffic for any top user. The service is selected in the main report. Vantage Report User’s Guide...
Page 45
Use this report to look at the remote VPN users who sent the most VPN traffic. You can also use this report to look at the services sent through VPN from or to a top user. Client-to-Site (SSL) Vantage Report User’s Guide...
Page 46
Use this report to look at the top categories of DoS attacks by number of attacks. You can also use this report to look at the top sources of DoS attacks for any top category. Intrusion Hits Vantage Report User’s Guide...
Page 47
Use this report to look at the top destinations of virus occurrences Destination by number of occurrences. You can also use this report to look at the top viruses for any top destination. Spam Vantage Report User’s Guide...
Page 48
Use this report to look at the top sources of attempts to access unsafe web sites by number of attempts. You can also use this report to look at the top destinations in attempts to access unsafe web sites for any top source. Vantage Report User’s Guide...
Page 49
Security Policy Enforcement Use this screen to see which users’ computers complied or failed to comply with defined corporate policies before they can access the network. Content Filter(All) Vantage Report User’s Guide...
Page 50
Use this report to look at the applications for which the device Applications blocked the most connections. Blocked Top Users Use this report to look at the users for which the device blocked Blocked the most connections. Vantage Report User’s Guide...
Page 51
Use these screens to look at the total number of logs that Vantage Report has received per day or per device. VRPT Use this screen to look at the Vantage Report’s system logs. System Logs Use these screens to archive historical logs regularly and store in Archiving a preferred location.
XML file, or you can add devices stored in XML format to Vantage Report. Upgrade Use this screen to install new releases of Vantage Report. Do not use this screen to upgrade to the full version. Registration Use this screen to upgrade to the full version, or increase the number of devices Vantage Report supports.
You can create multiple layers of folders for devices. This field displays the Path name used to refer to the device in Vantage Report and the folders that the device is in. For example, if the device path is “folder1/folder2/myZW5”, “folder1”...
For other screens, the layout is different for each one. Typical examples of monitors and statistical reports are shown in Figure Figure 16 Report and Setting Window: Monitor and Statistical Report Examples Statistical Report Monitor Vantage Report User’s Guide...
Page 55
SECTION DESCRIPTION Device Path, MAC: These fields display the path you added the ZyXEL device in the Vantage Report and the device’s MAC address. Print icon: Click this icon to print the current screen. This field shows the menu items you selected to open this monitor.
Page 56
Figure 18 Report and Setting Window Right-Click Menu Click Settings... if you want to change the Flash settings on the Vantage Report server. In most cases, this is unnecessary. Click About Adobe Flash Player 9... to get information about the current version of Flash.
Page 57
SECTION DESCRIPTION Device Path, MAC: These fields display the path you added the ZyXEL device in the Vantage Report and the device’s MAC address. Print icon: Click this icon to print the current screen. This field shows the menu items you selected to open this statistical report.
Page 58
Figure 20 Report and Setting Window Right-Click Menu Click Settings... if you want to change the Flash settings on the Vantage Report server. In most cases, this is unnecessary. Click About Adobe Flash Player 9... to get information about the current version of Flash.
3.7 System Dashboard When you log into the Vantage Report, the System Dashboard is the first screen displayed. The screen summarizes the Vantage Report system, license, log Vantage Report User’s Guide...
Page 60
Free JVM Memory This field displays the amount of memory size available for Java Size applications. Log Receiver Information Total Log Number This field displays the total number of log entries the Vantage Report stores. Vantage Report User’s Guide...
Page 61
Table 14 System Dashboard LABEL DESCRIPTION Total Number of This field displays the total number of log entries the Vantage Report Today has received today. Max Log Number This field displays the number of a device’s log entries and the of Single Device device’s name which sends the most number of logs to the Vantage...
Page 62
Chapter 3 The Web Configurator Vantage Report User’s Guide...
Table 15 Monitor (Folder) LABEL DESCRIPTION Refresh Select how often (1 Minute, 5 Minutes, 10 Minutes) the Vantage Report Interval updates the information in this screen. Select None to not to update this screen. Click Refresh Now to update the screen immediately.
Type up to 29 alphanumeric characters for the name of the monitor item. Underscore (_) is allowed. Click this to add the monitor item to the list table below and save the changes to the Vantage Report. This field displays the index number of the monitor item. Monitor Name This field displays the name of the monitor item.
Monitor menu to open the screen for the device. You get to pre-configure a list of reports or monitors you want the Vantage Report to display first. The dashboard is available with the full version of Vantage Report.
Page 68
Then it takes you to the following screen where you can configure up to 4 monitors and/or reports shown in the device dashboard at one time. Figure 26 Dashboard Configuration Select a monitor or summary report to display for each. Vantage Report User’s Guide...
The dashboard looks as follows when you finish configuring it. Click the magnifying glass icon at the right bottom of each monitor or report to go to the corresponding monitor screen. The dashboard is available with the full Vantage Report User’s Guide...
Page 70
Chapter 4 Monitor version of Vantage Report. See Section 3.6.1 on page 53 for the field descriptions shown in the screen. Figure 28 Dashboard Configured If you want to change a dashboard monitor or report, click the icon at the top right corn.
Table 17 Monitor > Hardware Status > CPU Usage LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. The Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 18 Monitor > Hardware Status > Memory Usage LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. The Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 19 Monitor > Network Traffic > Session Usage LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Rx to display received traffic throughput statistics in KBytes per second. Alternatively, select Tx-Rx to display both. Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph.
Click Monitor > Network Traffic > Bandwidth > Interface Usage to open this screen. Use this screen to monitor the throughput statistics on a selected device’s interface. Figure 33 Monitor > Network Traffic > Bandwidth > Interface Usage Vantage Report User’s Guide...
Page 76
Rx to display received traffic throughput statistics in KBytes per second. Alternatively, select Tx-Rx to display both. Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph.
Table 22 Monitor > Network Traffic > Web LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 23 Monitor > Network Traffic > FTP LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 24 Monitor > Network Traffic > Mail LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 25 Monitor > Secure Remote Access > Site-to-Site(IPSec) LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 26 Monitor > Secure Remote Access > Client-to-Site(IPSec) LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 27 Monitor > Secure Remote Access > Client-to-Site(SSL) LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 28 Monitor > Network Security > Firewall Access Control LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph.
Table 29 Monitor > Network Security > Attack LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 30 Monitor > Network Security > Intrusion Hits LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 31 Monitor > Network Security > AntiVirus LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 32 Monitor > E-Mail Security > Virus Found LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 33 Monitor > E-Mail Security > Spam LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 34 Monitor > E-Mail Security > Intrusion Hits LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 35 Monitor > Web Security > Security Threat LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 36 Monitor > Web Security > Virus Found LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 37 Monitor > Web Security > Intrusion Hits LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph. Vantage Report automatically calculates the start time depending on the period you selected in the Period field.
Table 38 Monitor > Security Policy Enforcement > Content Filter LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph.
Table 39 Monitor > Security Policy Enforcement > App Patrol LABEL DESCRIPTION Period Select the length of time for which Vantage Report should display statistics. Start Time This field displays the date and time of the earliest traffic statistics in the graph.
ZyXEL device, and which protocols were used. You can also look at traffic in various directions. 5.1.1 Bandwidth Summary Use this report to look at the amount of traffic handled by the selected device by time interval. Vantage Report User’s Guide...
Page 97
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 98
MBytes This field displays how much traffic (in megabytes) the device Transferred handled in each time interval. Vantage Report User’s Guide...
Use this report to look at the top services in a specific time interval. Click on a specific time interval in Report > Network Traffic > Bandwidth > Summary to open this screen. Figure 53 Report > Network Traffic > Bandwidth > Summary > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 5.1.3 Bandwidth Top Protocols Use this report to look at the top services generating traffic through the selected device. Vantage Report User’s Guide...
Page 101
Chapter 5 Network Traffic Click Report > Network Traffic > Bandwidth > Top Protocols to open this screen. Figure 54 Report > Network Traffic > Bandwidth > Top Protocols Vantage Report User’s Guide...
Page 102
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 103
These services may be different than the ones you manage in the Service Settings screen. Click on a service to look at the top sources of traffic for the selected service. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the services above. 5.1.4 Bandwidth Top Protocols Drill-Down Use this report to look at the top sources of traffic for any top service. Vantage Report User’s Guide...
Page 105
Chapter 5 Network Traffic Click on a specific service in Report > Network Traffic > Bandwidth > Top Protocols to open this screen. Figure 55 Report > Network Traffic > Bandwidth > Top Protocol > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 5.1.5 Top Bandwidth Hosts Use this report to look at the top sources of traffic in the selected device. Vantage Report User’s Guide...
Page 107
Chapter 5 Network Traffic Click Report > Network Traffic > Bandwidth > Top Hosts to open this screen. Figure 56 Report > Network Traffic > Bandwidth > Top Hosts Vantage Report User’s Guide...
Page 108
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 109
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.1.6 Top Bandwidth Hosts Drill-Down Use this report to look at the top services used by any top source. Vantage Report User’s Guide...
Page 111
This field displays the top services used by the selected source, sorted by the amount of traffic attributed to each one. These services may be different than the ones you manage in the Service Settings screen. Vantage Report User’s Guide...
Back Click this to return to the main report. 5.1.7 Top Bandwidth Users Use this report to look at the selected device’s logged-in users with the most traffic. Vantage Report User’s Guide...
Page 113
Direction Select which kind of traffic, by direction, you want to look at. Bi-dir - all traffic, regardless of direction Rx - all traffic received on the device Tx - all traffic sent from the device Vantage Report User’s Guide...
Page 114
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the users above. 5.1.8 Top Bandwidth Users Drill-Down Use this report to look at the top services used by any top bandwidth user. Vantage Report User’s Guide...
Page 116
This field displays the top services used by the selected user, sorted by the amount of traffic attributed to each one. These services may be different than the ones you manage in the Service Settings screen. Vantage Report User’s Guide...
Back Click this to return to the main report. 5.1.9 Top Bandwidth Destinations Use this report to look at the destination IP addresses to which the selected device sent the most traffic. Vantage Report User’s Guide...
Page 118
Chapter 5 Network Traffic Click Report > Network Traffic > Bandwidth > Top Destinations to open this screen. Figure 60 Report > Network Traffic > Bandwidth > Top Destinations Vantage Report User’s Guide...
Page 119
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 120
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the totals for the users above. 5.1.10 Top Bandwidth Destinations Drill-Down Use this report to look at the services that were used the most (on the selected device) to access the top destination IP addresses. Vantage Report User’s Guide...
Page 122
Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. Color This field displays what color represents each source in the graph. Vantage Report User’s Guide...
Click this to return to the main report. 5.2 Web Traffic These reports look at the top destinations and sources of web traffic. 5.2.1 Top Web Sites Use this report to look at the top destinations of web traffic. Vantage Report User’s Guide...
Page 124
Chapter 5 Network Traffic Click Report > Network Traffic > WEB > Top Sites to open this screen. Figure 62 Report > Network Traffic > WEB > Top Sites Vantage Report User’s Guide...
Page 125
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 5.2.2 Top Web Sites Drill-Down Use this report to look at the top sources of web traffic for any top destination. Vantage Report User’s Guide...
Page 127
Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. Color This field displays what color represents each source in the graph. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.2.3 Top Web Hosts Use this report to look at the top sources of web traffic. Vantage Report User’s Guide...
Page 129
Chapter 5 Network Traffic Click Report > Network Traffic > WEB > Top Hosts to open this screen. Figure 64 Report > Network Traffic > WEB > Top Hosts Vantage Report User’s Guide...
Page 130
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.2.4 Top Web Hosts Drill-Down Use this report to look at the top destinations of web traffic for any top source. Vantage Report User’s Guide...
Page 132
Each destination is identified by its IP address. If DNS Reverse is enabled in System > General Configuration, the table displays the domain name, if identifiable, with the IP address (for example, “www.yahoo.com/200.100.20.10”). Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.2.5 Top Web Users Use this report to look at the users that send the most web traffic. Vantage Report User’s Guide...
Page 134
Chapter 5 Network Traffic Click Report > Network Traffic > WEB > Top Users to open this screen. Figure 66 Report > Network Traffic > WEB > Top Users Vantage Report User’s Guide...
Page 135
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.2.6 Top Web Users Drill-Down Use this report to look at the top destinations of web traffic for any top user. Vantage Report User’s Guide...
Page 137
Chapter 5 Network Traffic Click on a specific source in Report > Network Traffic > WEB > Top Users to open this screen. Figure 67 Report > Network Traffic > WEB > Top Users > Drill-Down Vantage Report User’s Guide...
Click this to return to the main report. 5.3 FTP Traffic These reports look at the top destinations and sources of FTP traffic. 5.3.1 Top FTP Sites Use this report to look at the top destinations of FTP traffic. Vantage Report User’s Guide...
Page 139
Chapter 5 Network Traffic Click Report > Network Traffic > FTP > Top Sites to open this screen. Figure 68 Report > Network Traffic > FTP > Top Sites Vantage Report User’s Guide...
Page 140
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 5.3.2 Top FTP Sites Drill-Down Use this report to look at the top sources of FTP traffic for any top destination. Vantage Report User’s Guide...
Page 142
Chapter 5 Network Traffic Click on a specific destination in Report > Network Traffic > FTP > Top Sites to open this screen. Figure 69 Report > Network Traffic > FTP > Top Sites > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.3.3 Top FTP Hosts Use this report to look at the top sources of FTP traffic. Vantage Report User’s Guide...
Page 144
Chapter 5 Network Traffic Click Report > Network Traffic > FTP > Top Hosts to open this screen. Figure 70 Report > Network Traffic > FTP > Top Hosts Vantage Report User’s Guide...
Page 145
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.3.4 Top FTP Hosts Drill-Down Use this report to look at the top destinations of FTP traffic for any top source. Vantage Report User’s Guide...
Page 147
Chapter 5 Network Traffic Click on a specific source in Report > Network Traffic > FTP > Top Hosts to open this screen. Figure 71 Report > Network Traffic > FTP > Top Hosts > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.3.5 Top FTP Users Use this report to look at the users that send the most FTP traffic. Vantage Report User’s Guide...
Page 149
Chapter 5 Network Traffic Click Report > Network Traffic > FTP > Top Users to open this screen. Figure 72 Report > Network Traffic > FTP > Top Users Vantage Report User’s Guide...
Page 150
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.3.6 Top FTP Users Drill-Down Use this report to look at the top destinations of FTP traffic for any top user. Vantage Report User’s Guide...
Page 152
This field displays the number of traffic events from the selected user to each destination. % of Sessions This field displays what percentage of the selected user’s total number of traffic events went to each destination. Vantage Report User’s Guide...
Click this to return to the main report. 5.4 Mail Traffic These reports look at the top destinations and sources of mail traffic. 5.4.1 Top Mail Sites Use this report to look at the top destinations and sources of mail traffic. Vantage Report User’s Guide...
Page 154
Chapter 5 Network Traffic Click Report > Network Traffic > MAIL > Top Sites to open this screen. Figure 74 Report > Network Traffic > MAIL > Top Sites Vantage Report User’s Guide...
Page 155
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 5.4.2 Top Mail Sites Drill-Down Use this report to look at the top sources of mail traffic for any top destination. Vantage Report User’s Guide...
Page 157
Chapter 5 Network Traffic Click on a specific destination in Report > Network Traffic > MAIL > Top Sites to open this screen. Figure 75 Report > Network Traffic > MAIL > Top Sites > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.4.3 Top Mail Hosts Use this report to look at the top sources of mail traffic. Vantage Report User’s Guide...
Page 159
Chapter 5 Network Traffic Click Report > Network Traffic > MAIL > Top Hosts to open this screen. Figure 76 Report > Network Traffic > MAIL > Top Hosts Vantage Report User’s Guide...
Page 160
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.4.4 Top Mail Hosts Drill-Down Use this report to look at the top destinations of mail traffic for any top source. Vantage Report User’s Guide...
Page 162
Chapter 5 Network Traffic Click on a specific source in Report > Network Traffic > MAIL > Top Hosts to open this screen. Figure 77 Report > Network Traffic > MAIL > Top Hosts > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.4.5 Top Mail Users Use this report to look at the users that send the most mail traffic. Vantage Report User’s Guide...
Page 164
Chapter 5 Network Traffic Click Report > Network Traffic > MAIL > Top Users to open this screen. Figure 78 Report > Network Traffic > MAIL > Top Users Vantage Report User’s Guide...
Page 165
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 5.4.6 Top Mail Users Drill-Down Use this report to look at the top destinations of mail traffic for any top user. Vantage Report User’s Guide...
Page 167
Chapter 5 Network Traffic Click on a specific source in Report > Network Traffic > MAIL > Top Users to open this screen. Figure 79 Report > Network Traffic > MAIL > Top Users > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.5 Other Traffic These reports look at the top sources and destinations of any kind of traffic. Vantage Report User’s Guide...
Other Traffic reports. These services appear in the Customized Services drop-down box. You can use services that are pre-defined in Vantage Report, or you can create new services. If you create new services, you have to specify the protocol and port number(s) for the service.
5.5.3 Top Destinations of Other Traffic Use this report to look at the top destinations of other services’ traffic. Vantage Report User’s Guide...
Page 171
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 172
This field displays the number of traffic events for each destination. % of Sessions This field displays what percentage each destination’s number of traffic events makes out of the total number of traffic events that match the settings you displayed in this report. Vantage Report User’s Guide...
The service is selected in the main report. Click on a specific destination in Report > Network Traffic > Customization > Top Destinations to open this screen. Figure 83 Report > Network Traffic > Customization > Top Destinations > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 5.5.5 Top Sources of Other Traffic Use this report to look at the top sources of other services’ traffic. Vantage Report User’s Guide...
Page 175
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 176
Click on a source to look at the top destinations of the selected service’s traffic for the selected source. Color This field displays what color represents each source in the graph. Sessions This field displays the number of traffic events for each source. Vantage Report User’s Guide...
The service is selected in the main report. Click on a specific source in Report > Network Traffic > Customization > Top Sources to open this screen. Figure 85 Report > Network Traffic > Customization > Top Sources > Drill-Down Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Back Click this to return to the main report. 5.5.7 Top Other Traffic Users Use this report to look at the users that send the most other services’ traffic. Vantage Report User’s Guide...
Page 179
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 180
This field displays the number of traffic events for each user. % of Sessions This field displays what percentage each user’s number of traffic events makes out of the total number of traffic events for the time range of the report. Vantage Report User’s Guide...
The service is selected in the main report. Click on a specific user in Report > Network Traffic > Customization > Top Users to open this screen. Figure 87 Report > Network Traffic > Customization > Top Users > Drill-Down Vantage Report User’s Guide...
Page 182
View Logs Click this icon to see the logs that go with the record. Back Click this to return to the main report. Vantage Report User’s Guide...
Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure IPSec is enabled. 6.1.1 Secure Remote Access Link Status Use this report to see which of the device’s Secure Remote Access tunnels are connected. Vantage Report User’s Guide...
Page 184
A tunnel’s status icon is red when the Secure Remote Access tunnel is not connected. Total Count This field displays how many sites are recorded. Total Page This field displays how many screens it takes to display all the sites. Vantage Report User’s Guide...
Table 76 Report > Secure Remote Access > Site-to-Site (IPSec) > Traffic Monitor LABEL DESCRIPTION Site Select a peer IPSec router. Tunnel Select a Secure Remote Access tunnel. Select All to display the total traffic for the device’s Secure Remote Access tunnels with the selected site. Vantage Report User’s Guide...
Start Time and End Time. 6.1.3 Top VPN Peer Gateways Use this report to look at the top destinations of VPN traffic. The device must be a ZyNOS based ZyWALL in order to view this report. Vantage Report User’s Guide...
Page 187
Chapter 6 Secure Remote Access Click Report > VPN > Site-to-Site > Top Peer Gateways to open this screen. Figure 90 Report > VPN > Site-to-Site > Top Peer Gateways Vantage Report User’s Guide...
Page 188
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 6.1.4 Top VPN Peer Gateways Drill-Down Use this report to look at the top sources of VPN traffic for any top destination. Vantage Report User’s Guide...
Page 190
Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. Color This field displays what color represents each source in the graph. Vantage Report User’s Guide...
10 sources in the screen. Back Click this to return to the main report. 6.1.5 Top Secure Remote Access Sites Use this report to look at the peer IPSec routers with the most Secure Remote Access traffic. Vantage Report User’s Guide...
Page 192
Chapter 6 Secure Remote Access Click Report > Secure Remote Access > Site-to-Site (IPSec) > Top Sites to open this screen. Figure 92 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Sites Vantage Report User’s Guide...
Page 193
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 6.1.6 Top Secure Remote Access Sites Drill-Down Use this report to look at the top sources of Secure Remote Access traffic for any top destination. Vantage Report User’s Guide...
Page 195
Click on a specific destination in Report > Secure Remote Access > Site-to- Site (IPSec) > Top Sites to open this screen. Figure 93 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Sites > Drill- Down Vantage Report User’s Guide...
Back Click this to return to the main report. 6.1.7 Top Secure Remote Access Tunnels Use this report to look at the Secure Remote Access tunnels with the most Secure Remote Access traffic. Vantage Report User’s Guide...
Page 197
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 198
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the totals for the destinations above. 6.1.8 Top Secure Remote Access Tunnels Drill-Down Use this report to look at the top senders or receivers of Secure Remote Access traffic for a top Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 200
Click on a specific destination in Report > Secure Remote Access > Site-to- Site (IPSec) > Top Tunnels to open this screen. Figure 95 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Tunnels > Drill-Down Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.1.9 Top Secure Remote Access Protocols Use this report to look at the top services generating Secure Remote Access traffic through the selected device. Vantage Report User’s Guide...
Page 202
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 203
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Total This entry displays the totals for the protocols above. 6.1.10 Top Secure Remote Access Protocols Drill-Down Use this report to look at the top senders or receivers of any top service through Secure Remote Access. Vantage Report User’s Guide...
Page 205
Click on a specific service in Report > Secure Remote Access > Site-to-Site (IPSec) > Top Protocols to open this screen. Figure 97 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Protocols > Drill-Down Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.1.11 Top Secure Remote Access Hosts Use this report to look at the top senders or receivers of Secure Remote Access traffic. Vantage Report User’s Guide...
Page 207
Tunnel Select a Secure Remote Access tunnel. Select All to display the total traffic for the device’s Secure Remote Access tunnels with the selected site (or all sites). This field is not available with all models. Vantage Report User’s Guide...
Page 208
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). The field does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 209
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the totals for the hosts above. 6.1.12 Top Secure Remote Access Hosts Drill-Down Use this report to look at the services sent through Secure Remote Access from a top sender or to a top receiver. Vantage Report User’s Guide...
Page 211
Each service is identified by its IP address. Color This field displays what color represents each protocol in the graph. Sessions This field displays the number of traffic events of each protocol. Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.1.13 Top Secure Remote Access Users Use this report to look at the users that send or receive the most Secure Remote Access traffic. Vantage Report User’s Guide...
Page 213
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 214
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Total This entry displays the totals for the users above. 6.1.14 Top Secure Remote Access Users Drill-Down Use this report to look at the services sent through Secure Remote Access from or to a top user. Vantage Report User’s Guide...
Page 216
This field displays the number of traffic events of each protocol. % of Sessions This field displays what percentage each protocol’s number of traffic events makes out of the total number of traffic events for the selected Secure Remote Access traffic. Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.1.15 Top Secure Remote Access Destinations Use this report to look at the destinations with the most Secure Remote Access traffic. Vantage Report User’s Guide...
Page 218
IPSec router they use. Tunnel Select a Secure Remote Access tunnel. Select All to display the total traffic for the device’s Secure Remote Access tunnels with the selected site (or all sites). Vantage Report User’s Guide...
Page 219
These fields reset to the default values when you click a menu item in the menu panel (including the menu item for the same report). The fields do not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Total This entry displays the totals for the destinations above. 6.1.16 Top Secure Remote Access Destinations Drill-Down Use this report to look at the services sent through Secure Remote Access from or to a top destination. Vantage Report User’s Guide...
Page 221
Click on a specific destination in Report > Secure Remote Access > Site-to- Site (IPSec) > Top Destinations to open this screen. Figure 103 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Destinations > Drill-Down Vantage Report User’s Guide...
Secure Remote Access tunnel. The Secure Remote Access remote access screens display statistics for remote users that use dynamic Secure Remote Access tunnels and have been authenticated by xauth. Vantage Report User’s Guide...
Use this report to see statistics about the device’s remote Secure Remote Access users. Click Report > Secure Remote Access > Client-to-Site (IPSec) > User Status to open this screen. Figure 104 Report > Secure Remote Access > Client-to-Site (IPSec) > User Status Vantage Report User’s Guide...
Page 224
This column displays the current status of users who have logged in. A user’s status icon is green when the user is currently connected. A user’s status icon is red when the user has already logged out. Vantage Report User’s Guide...
This entry displays the total number of users on each page of the report. 6.2.2 Secure Remote Access User Status Drill-Down Use this report to look at the services transferred through the device by any top users. Vantage Report User’s Guide...
Page 226
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.2.3 Top Secure Remote Access Protocols Use this report to display which services the remote access users sent or received the most. Vantage Report User’s Guide...
Page 228
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 229
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 6.2.4 Top Secure Remote Access Protocols Drill-Down Use this report to look at the top remote access senders or receivers of any top service. Vantage Report User’s Guide...
Page 231
Click on a specific service in Report > Secure Remote Access > Client-to-Site (IPSec) > Top Protocols to open this screen. Figure 107 Report > Secure Remote Access > Client-to-Site (IPSec) > Top Protocols > Drill-Down Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.2.5 Top Secure Remote Access Destinations Use this report to look at the destinations with the most remote access Secure Remote Access traffic. Vantage Report User’s Guide...
Page 233
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 234
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the totals for the destinations above. 6.2.6 Top Secure Remote Access Destinations Drill-Down Use this report to look at the remote access hosts that sent the most traffic to the selected top destination. Vantage Report User’s Guide...
Page 236
Click on a specific destination in Report > Secure Remote Access > Client-to- Site (IPSec) > Top Destinations to open this screen. Figure 109 Report > Secure Remote Access > Client-to-Site (IPSec) > Top Destinations > Drill-Down Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.2.7 Secure Remote Access Top Users Use this report to look at the users that send or receive the most Secure Remote Access traffic. Vantage Report User’s Guide...
Page 238
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). The field does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 239
This field displays the number of traffic events for each destination. % of Sessions This field displays what percentage each destination’s number of traffic events makes out of the total number of traffic events that match the settings you displayed in this report. Vantage Report User’s Guide...
This entry displays the totals for the destinations above. 6.2.8 Secure Remote Access Top Users Drill-Down Use this report to look at the services transferred the most through Secure Remote Access remote access by any top users. Vantage Report User’s Guide...
Page 241
Click on a specific user in Report > Secure Remote Access > Client-to-Site (IPSec) > Top Users to open this screen. Figure 111 Report > Secure Remote Access > Client-to-Site (IPSec) > Top Users > Drill-Down Vantage Report User’s Guide...
(by username and password) when they try to initiate a SSL Secure Remote Access tunnel. The Secure Remote Access remote access screens display statistics for remote users that use SSL Secure Remote Access tunnels and have been authenticated. Vantage Report User’s Guide...
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). The field does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 244
This field displays the amount of Secure Remote Access traffic sent or (MBytes) received by the user and routed through the device. Click the title of this column to sort the list of users by the amount of traffic routed through the device. Vantage Report User’s Guide...
Click on a specific user in Report > Secure Remote Access > Client-to-Site (SSL) > User Status to open this screen. Figure 113 Report > Secure Remote Access > Client-to-Site (SSL) > User Status > Drill-Down Vantage Report User’s Guide...
10 services for the selected user. Back Click this to return to the main report. 6.3.3 Top Secure Remote Access Protocols Use this report to display which services the remote access users used the most. Vantage Report User’s Guide...
Page 247
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 248
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the totals for the sources above. 6.3.4 Top Secure Remote Access Protocols Drill-Down Use this report to look at the remote access senders or receivers who sent the most traffic for a specific service. Vantage Report User’s Guide...
Page 250
This field displays what percentage each user’s number of traffic events makes out of the total number of traffic events that match the settings you displayed in this report. MBytes This field displays how much traffic (in megabytes) the device Transferred handled for each user. Vantage Report User’s Guide...
TopN setting in Settings. Back Click this to return to the main report. 6.3.5 Top Secure Remote Access Destinations Use this report to look at the destinations with the most remote access Secure Remote Access traffic. Vantage Report User’s Guide...
Page 252
Both - all Secure Remote Access traffic the devices sent or received. Incoming - all traffic the devices received through Secure Remote Access tunnel. Outgoing - all traffic the devices sent out through Secure Remote Access tunnel. Vantage Report User’s Guide...
Page 253
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
This entry displays the traffic summary for the destination hosts. 6.3.6 Top Secure Remote Access Destinations Drill-Down Use this report to look at the remote access hosts that sent the most traffic to the selected top destination. Vantage Report User’s Guide...
Page 255
MBytes This field displays how much traffic (in megabytes) the device Transferred handled for each user. % of MBytes This field displays what percentage of Secure Remote Access traffic Transferred the device handled for each user. Vantage Report User’s Guide...
Use this report to look at the applications with the most remote access Secure Remote Access traffic. Click Report > Secure Remote Access > Client-to-Site (SSL) > Top Applications to open this screen. Figure 118 Report > Secure Remote Access > Client-to-Site (SSL) > Top Applications Vantage Report User’s Guide...
Page 257
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). The field does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 258
Each application is identified by its name. Click on an application to look at the top remote user’s hosts of Secure Remote Access traffic for the selected application. Type This field displays what kind of service the internal server provides. Vantage Report User’s Guide...
TopN setting in Settings. 6.3.8 Top Secure Remote Access Applications Drill-Down Use this report to look at the remote access hosts that sent the most traffic to the selected Secure Remote Access application. Vantage Report User’s Guide...
Page 260
This field displays what percentage each user’s number of traffic events makes out of the total number of traffic events that match the settings you displayed in this report. MBytes This field displays how much traffic (in megabytes) the device Transferred handled for each user. Vantage Report User’s Guide...
Use this report to look at the users that send or receive the most Secure Remote Access traffic. Click Report > Secure Remote Access > Client-to-Site (SSL) > Top Users to open this screen. Figure 120 Report > Secure Remote Access > Client-to-Site (SSL) > Top Users Vantage Report User’s Guide...
Page 262
These fields reset to the default values when you click a menu item in the menu panel (including the menu item for the same report). The fields do not reset when you open or close drill-down reports. Vantage Report User’s Guide...
10 services are displayed. You can change the number of services to be displayed through the TopN setting in Settings. 6.3.10 Secure Remote Access Top Users Drill-Down Use this report to look at the services sent the most through Secure Remote Access by the selected user. Vantage Report User’s Guide...
Page 264
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
IPSec Secure Remote Access tunnels. 6.4.1 Secure Remote Access Successful Login Use this report to monitor the total number of users that have successfully logged in to use one of the device’s Secure Remote Access tunnels. Vantage Report User’s Guide...
Page 266
Store Log Days in System > General Configuration. Click Apply to update the report immediately, or click Cancel to close this screen. Time This column displays when the user last logged in. The entries are sorted in chronological order. Vantage Report User’s Guide...
Page 268
Total This entry displays the total number of users on the current page of the report. If you want to see a different page of the report, type the number of the page in the field. Vantage Report User’s Guide...
In most devices, go to Logs > Log Settings, and make sure Access Control is enabled. 7.1.1 Top Users Blocked Use this report to look at the users from which the device blocked the most traffic. Vantage Report User’s Guide...
Page 270
Chapter 7 Network Security Click Report > Network Security > Firewall Access Control > Top Users Blocked to open this screen. Figure 124 Report > Network Security > Firewall Access Control > Top Users Blocked Vantage Report User’s Guide...
Page 271
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Note: To look at firewall access control reports, each ZyXEL device must record blocked packets and users in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Access Control is enabled. Vantage Report User’s Guide...
Page 273
Chapter 7 Network Security Click Report > Network Security > Firewall Access Control > Top Packets Blocked to open this screen. Figure 125 Report > Network Security > Firewall Access Control > Top Packets Blocked Vantage Report User’s Guide...
Page 274
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Note: To look at attack reports, each ZyXEL device must record DoS attacks in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Attacks is enabled. Vantage Report User’s Guide...
Page 277
This field displays what percentage of all DoS attacks was handled in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Use this report to look at the top categories of DoS attacks in a specific time interval. Click on a specific time interval in Report > Network Security > Attack > Summary to open this screen. Figure 127 Report > Network Security > Attack > Summary > Drill-Down Vantage Report User’s Guide...
Note: To look at attack reports, each ZyXEL device must record DoS attacks in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Attacks is enabled. Vantage Report User’s Guide...
Page 280
Chapter 7 Network Security Click Report > Network Security > Attack > Top Attacks to open this screen. Figure 128 Report > Network Security > Attack > Top Attacks Vantage Report User’s Guide...
Page 281
Color This field displays what color represents each category in the graph. Attacks This field displays how many DoS attacks from each category occurred in the selected time interval. Vantage Report User’s Guide...
Use this report to look at the top categories of DoS attacks for any top source. Click on a specific source in Report > Network Security > Attack > Top Attacks to open this screen. Figure 129 Report > Network Security > Attack > Top Attacks > Drill-Down Vantage Report User’s Guide...
Note: To look at attack reports, each ZyXEL device must record DoS attacks in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Attacks is enabled. Vantage Report User’s Guide...
Page 284
Chapter 7 Network Security Click Report > Network Security > Attack > Top Sources to open this screen. Figure 130 Report > Network Security > Attack > Top Sources Vantage Report User’s Guide...
Page 285
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 7.2.6 Top Attack Sources Drill-Down Use this report to look at the top categories of DoS attacks for any top source. Vantage Report User’s Guide...
Page 287
Color This field displays what color represents each category in the graph. Attacks This field displays the number of DoS attacks from each category that occurred from the selected source. Vantage Report User’s Guide...
Logs > Log Settings, and make sure Attacks is enabled. Click Report > Network Security > Attack > By Type to open this screen. Figure 132 Report > Network Security > Attack > By Type Vantage Report User’s Guide...
Page 289
This field displays what percentage of all DoS attacks come from each category. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the categories above. Vantage Report User’s Guide...
Use this report to look at the sources of DoS attacks for any top category. Click on a specific category in Report > Network Security > Attack > By Type to open this screen. Figure 133 Report > Network Security > Attack > By Type > Drill-Down Vantage Report User’s Guide...
Logs > Log Settings, and make sure IDP is enabled. Then, go to IDP > Signature, and make sure the ZyXEL device logs each Attack Type you want to see in Vantage Report. 7.3.1 Intrusion Hits Summary Use this report to look at the number of intrusions by time interval.
Page 293
This field displays what percentage of all intrusions was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Use this report to look at the intrusion signatures in a specific time interval. Click on a specific time interval in Report > Network Security > Intrusion Hits > Summary to open this screen. Figure 135 Report > Network Security > Intrusion Hits > Summary > Drill-Down Vantage Report User’s Guide...
Page 295
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. Back Click this to return to the main report. Vantage Report User’s Guide...
The following screen is displayed. Figure 136 Security Issue Details 7.3.3 Top Intrusion Hits Signatures Use this report to look at the top intrusion signatures by number of intrusions. Vantage Report User’s Guide...
Page 297
Chapter 7 Network Security Click Report > Network Security > Intrusion Hits > Top Intrusions to open this screen. Figure 137 Report > Network Security > Intrusion Hits > Top Intrusions Vantage Report User’s Guide...
Page 298
Click on an intrusion signature to look at the top sources for the selected signature. Color This field displays what color represents each intrusion signature in the graph. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. 7.3.4 Top Intrusion Hits Signatures Drill-Down Use this report to look at the top sources of intrusions for any top signature. Vantage Report User’s Guide...
Page 300
Chapter 7 Network Security Click on a specific intrusion signature in Report > Network Security > Intrusion Hits > Top Intrusions to open this screen. Figure 138 Report > Network Security > Intrusion Hits > Top Intrusions > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 7.3.5 Top Intrusion Hits Sources Use this report to look at the top sources of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 302
Chapter 7 Network Security Click Report > Network Security > Intrusion Hits > Top Sources to open this screen. Figure 139 Report > Network Security > Intrusion Hits > Top Sources Vantage Report User’s Guide...
Page 303
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 7.3.6 Top Intrusion Hits Sources Drill-Down Use this report to look at the top intrusion signatures for any top source. Vantage Report User’s Guide...
Page 305
This field displays the top intrusion signatures from the selected Signature source, sorted by the number of intrusions by each one. Color This field displays what color represents each intrusion signature in the graph. Severity This field displays the severity of each intrusion signature. Vantage Report User’s Guide...
Back Click this to return to the main report. 7.3.7 Top Intrusion Hits Destinations Use this report to look at the top destinations of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 307
Chapter 7 Network Security Click Report > Network Security > Intrusion Hits > Top Destinations to open this screen. Figure 141 Report > Network Security > Intrusion Hits > Top Destinations Vantage Report User’s Guide...
Page 308
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 7.3.8 Top Intrusion Hits Destinations Drill-Down Use this report to look at the top intrusion signatures for any top destination. Vantage Report User’s Guide...
Page 310
Intrusion This field displays the top intrusion signatures sent to the selected Signature destination, sorted by the number of intrusions at each one. Color This field displays what color represents each intrusion signature in the graph. Vantage Report User’s Guide...
Use this report to look at the severity (significance) of intrusions by number of intrusions. The levels of severity, in decreasing order of significance, are Emergency (system is unusable), Alert (immediate action is required), Critical, Error, Warning, Notice, Informational, and Debug. Vantage Report User’s Guide...
Page 312
Chapter 7 Network Security Click Report > Network Security > Intrusion Hits > By Severity to open this screen. Figure 143 Report > Network Security > Intrusion Hits > By Severity Vantage Report User’s Guide...
Page 313
This field displays what percentage of all intrusions are at each level of severity. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the severities above. Vantage Report User’s Guide...
Click on a slice in the pie chart to move it away from the pie chart a little. Intrusion This field displays the intrusion signatures of the selected severity, Signature sorted by the number of intrusions by each one. Vantage Report User’s Guide...
Virus is enabled. Then, go to Anti-Virus > General. ZyXEL devices can log viruses based on the Service the virus was using. Make sure the ZyXEL device logs viruses you want to include in Vantage Report. 7.4.1 Antivirus Summary Use this report to look at the number of virus occurrences by time interval.
Page 317
This field displays what percentage of all occurrences was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Use this report to look at the viruses in a specific time interval. Click on a specific time interval in Report > Network Security > AntiVirus > Summary to open this screen. Figure 146 Report > Network Security > AntiVirus > Summary > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 7.4.3 Top Viruses Use this report to look at the top viruses by number of occurrences. Vantage Report User’s Guide...
Page 320
Chapter 7 Network Security Click Report > Network Security > AntiVirus > Top Viruses to open this screen. Figure 147 Report > Network Security > AntiVirus > Top Viruses Vantage Report User’s Guide...
Page 321
Click on a virus to look at the top sources for the selected virus. Color This field displays what color represents each virus in the graph. Occurrences This field displays the number of occurrences of each virus. Vantage Report User’s Guide...
Use this report to look at the top sources of any top virus. Click on a specific virus in Report > Network Security > AntiVirus > Top Viruses to open this screen. Figure 148 Report > Network Security > AntiVirus > Top Viruses > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 7.4.5 Top Virus Sources Use this report to look at the top sources of virus occurrences by number of occurrences. Vantage Report User’s Guide...
Page 324
Chapter 7 Network Security Click Report > Network Security > AntiVirus > Top Sources to open this screen. Figure 149 Report > Network Security > AntiVirus > Top Sources Vantage Report User’s Guide...
Page 325
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 7.4.6 Top Virus Sources Drill-Down Use this report to look at the top viruses for any top source. Vantage Report User’s Guide...
Page 327
% of Occurrences This field displays what percentage of all occurrences from the selected source was made by each virus. View Logs Click this icon to see the logs that go with the record. Vantage Report User’s Guide...
Use this report to look at the top destinations of virus occurrences by number of occurrences. Click Report > Network Security > AntiVirus > Top Destinations to open this screen. Figure 151 Report > Network Security > AntiVirus > Top Destinations Vantage Report User’s Guide...
Page 329
Each destination is identified by its IP address. Color This field displays what color represents each destination in the graph. Vantage Report User’s Guide...
Use this report to look at the top viruses for any top destination. Click on a specific destination in Report > Network Security > AntiVirus > Top Destinations to open this screen. Figure 152 Report > Network Security > AntiVirus > Top Destinations > Drill-Down Vantage Report User’s Guide...
Page 331
Back Click this to return to the main report. Vantage Report User’s Guide...
Virus is enabled. Then, go to Anti-Virus > General. ZyXEL devices can log viruses based on the Service the virus was using. Make sure the ZyXEL device logs viruses you want to include in Vantage Report. 8.1.1 Virus Found Summary Use this report to look at the number of virus occurrences by time interval.
Page 334
Chapter 8 E-Mail Security Click Report > E-Mail Security > Virus Found > Summary to open this screen. Figure 153 Report > E-Mail Security > Virus Found > Summary Vantage Report User’s Guide...
Page 335
This field displays what percentage of all occurrences was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Use this report to look at the viruses in a specific time interval. Click on a specific time interval in Report > E-Mail Security > Virus Found > Summary to open this screen. Figure 154 Report > E-Mail Security > Virus Found > Summary > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 8.1.3 Top Viruses Use this report to look at the top viruses by number of occurrences. Vantage Report User’s Guide...
Page 338
Chapter 8 E-Mail Security Click Report > E-Mail Security > Virus Found > Top Viruses to open this screen. Figure 155 Report > E-Mail Security > Virus Found > Top Viruses Vantage Report User’s Guide...
Page 339
Click on a virus to look at the top sources for the selected virus. Color This field displays what color represents each virus in the graph. Occurrences This field displays the number of occurrences of each virus. Vantage Report User’s Guide...
Use this report to look at the top sources of any top virus. Click on a specific virus in Report > E-Mail Security > Virus Found > Top Viruses to open this screen. Figure 156 Report > E-Mail Security > Virus Found > Top Viruses > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 8.1.5 Top Virus Sources Use this report to look at the top sources of virus occurrences by number of occurrences. Vantage Report User’s Guide...
Page 342
Chapter 8 E-Mail Security Click Report > E-Mail Security > Virus Found > Top Sources to open this screen. Figure 157 Report > E-Mail Security > Virus Found > Top Sources Vantage Report User’s Guide...
Page 343
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 8.1.6 Top Virus Sources Drill-Down Use this report to look at the top viruses for any top source. Vantage Report User’s Guide...
Page 345
% of Occurrences This field displays what percentage of all occurrences from the selected source was made by each virus. View Logs Click this icon to see the logs that go with the record. Vantage Report User’s Guide...
Use this report to look at the top destinations of virus occurrences by number of occurrences. Click Report > E-Mail Security > Virus Found > Top Destinations to open this screen. Figure 159 Report > E-Mail Security > Virus Found > Top Destinations Vantage Report User’s Guide...
Page 347
Each destination is identified by its IP address. Color This field displays what color represents each destination in the graph. Vantage Report User’s Guide...
Use this report to look at the top viruses for any top destination. Click on a specific destination in Report > E-Mail Security > Virus Found > Top Destinations to open this screen. Figure 160 Report > E-Mail Security > Virus Found > Top Destinations > Drill-Down Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Anti- Spam is enabled. 8.2.1 Spam Summary Use this report to look at the number of spam messages by time interval. Vantage Report User’s Guide...
Page 351
This field displays what percentage of all spam messages was made in Spams each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
SMTP server. Click on a specific time interval in Report > E-Mail Security > Spam > Summary to open this screen. Figure 162 Report > E-Mail Security > Spam > Summary > Drill-Down Vantage Report User’s Guide...
Use this report to look at the top combinations of senders of spam messages and the first SMTP server to which the sender sends spam. For example, if a sender sends spam through two SMTP servers, there are two entries for the sender, one with each SMTP server. Vantage Report User’s Guide...
Page 354
Chapter 8 E-Mail Security Click Report > E-Mail Security > Spam > Top Senders to open this screen. Figure 163 Report > E-Mail Security > Spam > Top Senders Vantage Report User’s Guide...
Page 355
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the senders above. 8.2.4 Top Spam Sources Use this report to look at the top sources of spam messages by number of messages. Vantage Report User’s Guide...
Page 357
Chapter 8 E-Mail Security Click Report > E-Mail Security > Spam > Top Sources to open this screen. Figure 164 Report > E-Mail Security > Spam > Top Sources Vantage Report User’s Guide...
Page 358
Each SMTP server is identified by its IP address. If DNS Reverse is enabled in System > General Configuration, the table displays the domain name, if identifiable, with the IP address (for example, “www.yahoo.com/200.100.20.10”). Vantage Report User’s Guide...
Use this report to look at the scores calculated for spam messages by number of messages. Click Report > E-Mail Security > Spam > By Score to open this screen. Figure 165 Report > E-Mail Security > Spam > By Score Vantage Report User’s Guide...
Page 360
This field displays what percentage of all spam messages had each Spams score. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the scores above. Vantage Report User’s Guide...
Logs > Log Settings, and make sure IDP is enabled. Then, go to IDP > Signature, and make sure the ZyXEL device logs each Attack Type you want to see in Vantage Report. 8.3.1 Intrusion Hits Summary Use this report to look at the number of intrusions by time interval.
Page 362
This field displays what percentage of all intrusions was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Signature interval, sorted by the number of attempts by each one. Clicking on the entries in this column will open a new window with a description of this security issue (see Figure 168 on page 364). Vantage Report User’s Guide...
Page 364
Note: Clicking on some linked entries in the Intrusion screen will open a new window that provides details on the security issue encountered by the devices. The following screen is displayed. Figure 168 Security Issue Details Vantage Report User’s Guide...
Use this report to look at the top intrusion signatures by number of intrusions. Click Report > E-Mail Security > Intrusion Hits > Top Intrusions to open this screen. Figure 169 Report > E-Mail Security > Intrusion Hits > Top Intrusions Vantage Report User’s Guide...
Page 366
Click on an intrusion signature to look at the top sources for the selected signature. Color This field displays what color represents each intrusion signature in the graph. Vantage Report User’s Guide...
Use this report to look at the top sources of intrusions for any top signature. Click on a specific intrusion signature in Report > E-Mail Security > Intrusion Hits > Top Intrusions to open this screen. Figure 170 Report > E-Mail Security > Intrusion Hits > Top Intrusions > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 8.3.5 Top Intrusion Hits Sources Use this report to look at the top sources of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 369
Chapter 8 E-Mail Security Click Report > E-Mail Security > Intrusion Hits > Top Sources to open this screen. Figure 171 Report > E-Mail Security > Intrusion Hits > Top Sources Vantage Report User’s Guide...
Page 370
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 8.3.6 Top Intrusion Hits Sources Drill-Down Use this report to look at the top intrusion signatures for any top source. Vantage Report User’s Guide...
Page 372
This field displays what kind of intrusion each intrusion signature is. This corresponds to IDP > Signature > Attack Type in most ZyXEL devices. Intrusions This field displays the number of intrusions by the selected source using each intrusion signature. Vantage Report User’s Guide...
Back Click this to return to the main report. 8.3.7 Top Intrusion Hits Destinations Use this report to look at the top destinations of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 374
Chapter 8 E-Mail Security Click Report > E-Mail Security > Intrusion Hits > Top Destinations to open this screen. Figure 173 Report > E-Mail Security > Intrusion Hits > Top Destinations Vantage Report User’s Guide...
Page 375
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 8.3.8 Top Intrusion Hits Destinations Drill-Down Use this report to look at the top intrusion signatures for any top destination. Vantage Report User’s Guide...
Page 377
This field displays what kind of intrusion each intrusion signature is. This corresponds to IDP > Signature > Attack Type in most ZyXEL devices. Intrusions This field displays the number of intrusions of each intrusion signature sent to the selected destination. Vantage Report User’s Guide...
Emergency (system is unusable), Alert (immediate action is required), Critical, Error, Warning, Notice, Informational, and Debug. Click Report > E-Mail Security > Intrusion Hits > By Severity to open this screen. Figure 175 Report > E-Mail Security > Intrusion Hits > By Severity Vantage Report User’s Guide...
Page 379
This field displays what percentage of all intrusions are at each level of severity. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the severities above. Vantage Report User’s Guide...
Severity This field displays the severity of each intrusion signature. Type This field displays what kind of intrusion each intrusion signature is. This corresponds to IDP > Signature > Attack Type in most ZyXEL devices. Vantage Report User’s Guide...
Page 381
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. Back Click this to return to the main report. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 384
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
This entry displays the totals for the time intervals above. 9.1.2 Security Threat Summary Drill-Down Use this report to look at the top sources of attempts to access blocked web sites in a specific time interval. Vantage Report User’s Guide...
Page 386
Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. Color This field displays what color represents each host in the graph. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 388
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 389
This field displays what percentage of all attempts to access blocked web sites was made to each destination. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. Vantage Report User’s Guide...
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 392
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 393
This field displays what percentage the user had of all blocked attempts to access web sites. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. Vantage Report User’s Guide...
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 396
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 397
This field displays what percentage of all attempts to access blocked web sites was made from each source. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. Vantage Report User’s Guide...
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 400
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the categories above. 9.1.10 Security Threat Categories Drill-Down Use this report to look at the destinations for any category of blocked web traffic. Vantage Report User’s Guide...
Page 402
This field displays the destinations of blocked web traffic that belongs to the selected category, sorted by the number of attempts to each one. Each destination is identified by its domain name. Color This field displays what color represents each destination in the graph. Vantage Report User’s Guide...
Virus is enabled. Then, go to Anti-Virus > General. ZyXEL devices can log viruses based on the Service the virus was using. Make sure the ZyXEL device logs viruses you want to include in Vantage Report. 9.2.1 Virus Found Summary Use this report to look at the number of virus occurrences by time interval.
Page 404
Chapter 9 Web Security Click Report > Web Security > Virus Found > Summary to open this screen. Figure 187 Report > Web Security > Virus Found > Summary Vantage Report User’s Guide...
Page 405
This field displays what percentage of all occurrences was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
This field displays the number of occurrences of each virus in the selected time interval. % of Occurrences This field displays what percentage of all occurrences in the selected time interval was made by each virus. Vantage Report User’s Guide...
Use this report to look at the top viruses by number of occurrences. Click Report > Web Security > Virus Found > Top Viruses to open this screen. Figure 189 Report > Web Security > Virus Found > Top Viruses Vantage Report User’s Guide...
Page 408
Click on a virus to look at the top sources for the selected virus. Color This field displays what color represents each virus in the graph. Occurrences This field displays the number of occurrences of each virus. Vantage Report User’s Guide...
Use this report to look at the top sources of any top virus. Click on a specific virus in Report > Web Security > Virus Found > Top Viruses to open this screen. Figure 190 Report > Web Security > Virus Found > Top Viruses > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 9.2.5 Top Virus Sources Use this report to look at the top sources of virus occurrences by number of occurrences. Vantage Report User’s Guide...
Page 411
Chapter 9 Web Security Click Report > Web Security > Virus Found > Top Sources to open this screen. Figure 191 Report > Web Security > Virus Found > Top Sources Vantage Report User’s Guide...
Page 412
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Use this report to look at the top viruses for any top source. Click on a specific source in Report > Web Security > Virus Found > Top Sources to open this screen. Figure 192 Report > Web Security > Virus Found > Top Sources > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 9.2.7 Top Virus Destinations Use this report to look at the top destinations of virus occurrences by number of occurrences. Vantage Report User’s Guide...
Page 415
Chapter 9 Web Security Click Report > Web Security > Virus Found > Top Destinations to open this screen. Figure 193 Report > Web Security > Virus Found > Top Destinations Vantage Report User’s Guide...
Page 416
Each destination is identified by its IP address. Color This field displays what color represents each destination in the graph. Vantage Report User’s Guide...
Use this report to look at the top viruses for any top destination. Click on a specific destination in Report > Web Security > Virus Found > Top Destinations to open this screen. Figure 194 Report > Web Security > Virus Found > Top Destinations > Drill-Down Vantage Report User’s Guide...
Logs > Log Settings, and make sure IDP is enabled. Then, go to IDP > Signature, and make sure the ZyXEL device logs each Attack Type you want to see in Vantage Report. 9.3.1 Intrusion Hits Summary Use this report to look at the number of intrusions by time interval.
Page 419
Chapter 9 Web Security Click Report > Web Security > Intrusion Hits > Summary to open this screen. Figure 195 Report > Web Security > Intrusion Hits > Summary Vantage Report User’s Guide...
Page 420
This field displays what percentage of all intrusions was made in each time interval. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. Vantage Report User’s Guide...
Use this report to look at the intrusion signatures in a specific time interval. Click on a specific time interval in Report > Web Security > Intrusion Hits > Summary to open this screen. Figure 196 Report > Web Security > Intrusion Hits > Summary > Drill-Down Vantage Report User’s Guide...
Page 422
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. Back Click this to return to the main report. Vantage Report User’s Guide...
The following screen is displayed. Figure 197 Security Issue Details 9.3.3 Top Intrusion Hits Signatures Use this report to look at the top intrusion signatures by number of intrusions. Vantage Report User’s Guide...
Page 424
Chapter 9 Web Security Click Report > Web Security > Intrusion Hits > Top Intrusions to open this screen. Figure 198 Report > Web Security > Intrusion Hits > Top Intrusions Vantage Report User’s Guide...
Page 425
Click on an intrusion signature to look at the top sources for the selected signature. Color This field displays what color represents each intrusion signature in the graph. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. 9.3.4 Top Intrusion Hits Signatures Drill-Down Use this report to look at the top sources of intrusions for any top signature. Vantage Report User’s Guide...
Page 427
Chapter 9 Web Security Click on a specific intrusion signature in Report > Web Security > Intrusion Hits > Top Intrusions to open this screen. Figure 199 Report > Web Security > Intrusion Hits > Top Intrusions > Drill-Down Vantage Report User’s Guide...
Back Click this to return to the main report. 9.3.5 Top Intrusion Hits Sources Use this report to look at the top sources of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 429
Chapter 9 Web Security Click Report > Web Security > Intrusion Hits > Top Sources to open this screen. Figure 200 Report > Web Security > Intrusion Hits > Top Sources Vantage Report User’s Guide...
Page 430
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. 9.3.6 Top Intrusion Hits Sources Drill-Down Use this report to look at the top intrusion signatures for any top source. Vantage Report User’s Guide...
Page 432
This field displays the top intrusion signatures from the selected Signature source, sorted by the number of intrusions by each one. Color This field displays what color represents each intrusion signature in the graph. Severity This field displays the severity of each intrusion signature. Vantage Report User’s Guide...
Back Click this to return to the main report. 9.3.7 Top Intrusion Hits Destinations Use this report to look at the top destinations of intrusions by number of intrusions. Vantage Report User’s Guide...
Page 434
Chapter 9 Web Security Click Report > Web Security > Intrusion Hits > Top Destinations to open this screen. Figure 202 Report > Web Security > Intrusion Hits > Top Destinations Vantage Report User’s Guide...
Page 435
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 9.3.8 Top Intrusion Hits Destinations Drill-Down Use this report to look at the top intrusion signatures for any top destination. Vantage Report User’s Guide...
Page 437
This field displays the top intrusion signatures sent to the selected Signature destination, sorted by the number of intrusions at each one. Color This field displays what color represents each intrusion signature in the graph. Severity This field displays the severity of each intrusion signature. Vantage Report User’s Guide...
Emergency (system is unusable), Alert (immediate action is required), Critical, Error, Warning, Notice, Informational, and Debug. Click Report > Web Security > Intrusion Hits > By Severity to open this screen. Figure 204 Report > Web Security > Intrusion Hits > By Severity Vantage Report User’s Guide...
Page 439
This field displays what percentage of all intrusions are at each level of severity. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the severities above. Vantage Report User’s Guide...
Click on a slice in the pie chart to move it away from the pie chart a little. Intrusion This field displays the intrusion signatures of the selected severity, Signature sorted by the number of intrusions by each one. Vantage Report User’s Guide...
Page 441
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the intrusion signatures above. Back Click this to return to the main report. Vantage Report User’s Guide...
Page 442
Chapter 9 Web Security Vantage Report User’s Guide...
• Windows Auto Update setting and installed security patches • Personal firewall installation and activation • Anti-virus installation and activation • Windows registry settings • Processes that the endpoint must execute • Processes that the endpoint cannot execute Vantage Report User’s Guide...
Click on a slice in the pie chart to move it away from the pie chart a little. Checking Item This field displays the description about whether users’ computers passed all the EPS checking items or failed a specific checking item on the selected device. Vantage Report User’s Guide...
This field shows whether the user’s session passed EPS checking or the reason it failed. Time This field displays the time the Vantage Report server received the log entry from the ZyXEL device, not the time the user tried to access the protected network.
Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. 10.2.1 Summary Use this report to look at the number of attempts to access specified web sites by time interval. Vantage Report User’s Guide...
Page 447
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. 10.2.2 Summary Drill-Down Use this report to look at the top sources of attempts to access specified web sites in a specific time interval. Vantage Report User’s Guide...
Page 449
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. Vantage Report User’s Guide...
Page 451
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Content Filter (All) > Top Sites to open this screen. Figure 210 Report > Security Policy Enforcement > Content Filter (All) > Top Sites Vantage Report User’s Guide...
Page 452
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 10.2.4 Top Sites Drill-Down Use this report to look at the top sources for any top destination of web traffic. Vantage Report User’s Guide...
Page 454
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. Vantage Report User’s Guide...
Page 456
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 457
This field displays what percentage of all attempts to access specified web sites was made by each user. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. Vantage Report User’s Guide...
This field displays the title of the drill-down report. The title includes the date(s) you specified in the Last Days or Settings fields. Report Type Specify Top Categories, Top Sites or By Hour as the content to be displayed. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. Vantage Report User’s Guide...
Page 460
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 461
This field displays what percentage of all attempts to access allowed web sites was made from each sources. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. Vantage Report User’s Guide...
This field displays the title of the drill-down report. The title includes the date(s) you specified in the Last Days or Settings fields. Report Type Specify Top Categories, Top Sites or By Hour as the content to be displayed. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. Vantage Report User’s Guide...
Page 464
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Content Filter (All) > By Category to open this screen. Figure 216 Report > Security Policy Enforcement > Content Filter (All) > By Category Vantage Report User’s Guide...
Page 465
This field displays what percentage of all attempts to access blocked web sites belong to each category. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the categories above. Vantage Report User’s Guide...
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Note: To look at security policy reports, each ZyXEL device must record blocked web packets in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites are enabled. Vantage Report User’s Guide...
Page 468
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the time intervals above. 10.3.2 Summary Drill-Down Use this report to look at the top sources of attempts to access blocked web sites in a specific time interval. Vantage Report User’s Guide...
Page 470
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 472
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Content Filter (Blocked) > Top Sites to open this screen. Figure 220 Report > Security Policy Enforcement > Content Filter (Blocked) > Top Sites Vantage Report User’s Guide...
Page 473
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Click this icon to see the logs that go with the record. Total This entry displays the totals for the destinations above. 10.3.4 Top Blocked Sites Drill-Down Use this report to look at the top sources for any top destination of blocked web traffic. Vantage Report User’s Guide...
Page 475
Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. Color This field displays what color represents each source in the graph. Vantage Report User’s Guide...
Note: To look at security policy Web blocked reports, each ZyXEL device must record blocked web packets in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 477
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 478
This field displays what percentage the user had of all blocked attempts to access web sites. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the sources above. Vantage Report User’s Guide...
This field displays the title of the drill-down report. The title includes the date(s) you specified in the Last Days or Settings fields. Report Type Specify Top Categories, Top Sites or By Hour as the content to be displayed. Vantage Report User’s Guide...
Note: To look at security policy reports, each ZyXEL device must record blocked web packets in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 481
This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Vantage Report User’s Guide...
Page 482
This field displays the number of web site access attempts the device blocked from each source. % of Attempts This field displays what percentage of all attempts to access blocked web sites was made from each source. Vantage Report User’s Guide...
Click on a specific source in Report > Security Policy Enforcement > Content Filter (Blocked) > Top Hosts to open this screen. Figure 225 Report > Security Policy Enforcement > Content Filter (Blocked) > Top Hosts > Drill-Down Vantage Report User’s Guide...
See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User’s Guide...
Page 485
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Content Filter (Blocked) > By Category to open this screen. Figure 226 Report > Security Policy Enforcement > Content Filter (Blocked) > By Category Vantage Report User’s Guide...
Page 486
This field displays what percentage of all attempts to access blocked web sites belong to each category. View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the categories above. Vantage Report User’s Guide...
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Application Patrol is enabled. 10.4.1 Top Applications Blocked Use this report to look at the applications for which the device blocked the most connections. Vantage Report User’s Guide...
Page 489
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Application Access Control > Top Applications Blocked to open this screen. Figure 228 Report > Security Policy Enforcement > Application Access Control > Top Applications Blocked Vantage Report User’s Guide...
Page 490
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Note: To look at security policy reports, each ZyXEL device must record users blocked by the application patrol in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Application Patrol is enabled. Vantage Report User’s Guide...
Page 492
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Application Access Control > Top Users Blocked to open this screen. Figure 229 Report > Security Policy Enforcement > Application Access Control > Top Users Blocked Vantage Report User’s Guide...
Page 493
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
Note: To look at security policy reports, each ZyXEL device must record forwarded applications in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Application Patrol is enabled. Vantage Report User’s Guide...
Page 495
Chapter 10 Security Policy Enforcement Click Report > Security Policy Enforcement > Application Access Control > Top Applications Allowed to open this screen. Figure 230 Report > Security Policy Enforcement > Application Access Control > Top Applications Allowed Vantage Report User’s Guide...
Page 496
Click on a slice in the pie chart to move it away from the pie chart a little. Application This field displays the name of the application for which the selected device permitted connections, sorted by the number of connections for each one. Vantage Report User’s Guide...
Page 497
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the application rules above. Vantage Report User’s Guide...
ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure System Maintenance is enabled. Click Report > Event > Login > Successful Login to open the Successful Login screen. Figure 231 Report > Event > Login > Successful Login Vantage Report User’s Guide...
Page 500
(including the menu item for the same report). It does not reset when you open or close drill-down reports. Time This field displays the time the Vantage Report server received the log entry from the ZyXEL device, not the time the user logged into the device.
ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure System Maintenance is enabled. Click Report > Event > Login > Failed Login to open the Failed Login screen. Figure 232 Report > Event > Login > Failed Login Vantage Report User’s Guide...
Click this if you want to specify the select any Start Date and End Date. The Report Display Settings screen appears. Time This field displays the time the Vantage Report server received the log entry from the ZyXEL device, not the time the user tried unsuccessfully to log into the device.
Page 503
Chapter 11 Event Click Report > Event > Session Per Host > Top Hosts to open this screen. Figure 233 Report > Event > Session Per Host > Top Hosts Vantage Report User’s Guide...
Page 504
Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. Vantage Report User’s Guide...
NAT sessions in its log. See the User’s Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure System Maintenance is enabled. Vantage Report User’s Guide...
Page 506
Chapter 11 Event Click Report > Event > Session Per Host > Top Users to open this screen. Figure 234 Report > Event > Session Per Host > Top Users Vantage Report User’s Guide...
Page 507
NAT sessions per host, sorted by the number of occurrences for each one. If the number of users is less than the maximum number of records displayed in this table, every user is displayed. Each user is identified by user name. Vantage Report User’s Guide...
Page 508
View Logs Click this icon to see the logs that go with the record. Total This entry displays the totals for the users above. Vantage Report User’s Guide...
Attached Files option in any of the Customize ... Report screens for more information. If you do not have Vantage Report send the attachments you can still view the reports. The Vantage Report server backs up all scheduled reports in the <vrpt_home>\vrpt\data\scheduler folder.
Customize Scheduled Report screen appears. Delete Click this to delete the selected scheduled report. 12.2 Customize Daily Report Screen Use this screen to configure the Vantage Report to maintain and send daily reports. Vantage Report User’s Guide...
Page 511
Chapter 12 Schedule Report Click Report > Schedule Report > Summary. Either click on the index number of the entry you want to edit or click Add. Choose Daily Report in the Report Type. The following screen appears. Vantage Report User’s Guide...
Page 517
Vantage Report sends. The body must be 1-255 printable ASCII characters long. E-mail Attached Select this if you want Vantage Report to send the selected report(s) Files as attachment(s). Vantage Report also saves the selected report(s) on the Vantage Report server. If you do not select this, Vantage Report only saves the selected report(s) on the Vantage Report server.
Click this to close the screen without saving any changes. 12.3 Customize Weekly Report Screen Use this screen to configure the Vantage Report to maintain and send weekly reports. Click Report > Schedule Report > Summary. Either click on the index number of the entry you want to edit or click Add.
Page 519
Vantage Report sends. The body must be 1-255 printable ASCII characters long. E-mail Attached Select this if you want Vantage Report to send the selected report(s) Files as attachment(s). Vantage Report also saves the selected report(s) on the Vantage Report server. If you do not select this, Vantage Report only saves the selected report(s) on the Vantage Report server.
Chapter 12 Schedule Report 12.4 Customize Overtime Report Screen Use this screen to configure the Vantage Report to maintain and send reports during a specified period of time. Click Report > Schedule Report > Summary. Either click on the index number of the entry you want to edit or click Add.
Page 521
Vantage Report sends. The body must be 1-255 printable ASCII characters long. E-mail Attached Select this if you want Vantage Report to send the selected report(s) Files as attachment(s). Vantage Report also saves the selected report(s) on the Vantage Report server. If you do not select this, Vantage Report only saves the selected report(s) on the Vantage Report server.
Name This is the name that identifies the template inside Vantage Report. Click it to edit the template. Device Type This field displays which device this template can be generated for.
LABEL DESCRIPTION Name Enter a name to identify the template inside Vantage Report. Numbers (0-9), letters (a-zA-Z), periods (.) and the underscore (_) are allowed. Spaces are not allowed. The name must start with a number or letter. Use up to 28 characters.
Template Name This is the name that identifies the template inside Vantage Report. Click it to edit the template. Template Title This field displays the title that appears at the top of the reports generated using this template.
Page 525
Click this button to view a sample of a report in PDF format. Template Use this section of the screen to configure the template’s name and Configuration the report title and upload a logo to display on the reports. Vantage Report User’s Guide...
Page 526
LABEL DESCRIPTION Template Name Enter a name to identify the template inside Vantage Report. Numbers (0-9), letters (a-z, A-Z), periods (.) and the underscore (_) are allowed. Spaces are not allowed. The name must start with a number or letter. Use up to 28 characters.
Appendix B on page 599 for information on the logs. 13.1 Log Viewer Use this screen to view logs that devices send to Vantage Report. Click Logs > Log Viewer > All Logs to look at all log entries. The screen is shown next.
Page 528
System Setting > General Configuration screen. You can also click the Calendar icon to specify the date. Start Time Enter the time of the earliest log entries you want to see, if you select Day. Vantage Report User’s Guide...
Page 529
Select this to display logs with the domain name of hosts instead of their IP addresses. If you select this and Vantage Report does not find the domain name of a host, it will display the IP address. This feature might increase the amount of time it takes to display log entries, however.
Page 530
Click More Info to view an on-line help page about downloading files. Time This field displays the time the Vantage Report server received the log entry, not the time the log entry was generated. Source:Port This field displays the source IP address and port (if any) of the event that generated the entry.
13.2.1 By Day (Summary) Use this screen to look at the total number of logs that Vantage Report received by day. It also displays how many logs Vantage Report processed per second (on average).
Page 532
13.2.1.1 Log Receiver > By Day (Summary) > By Device Screen Use this screen to look at the total number of logs that Vantage Report received from each registered device on a particular day.
This field displays what percent of the day’s total logs came from each category. 13.3 By Device Use this screen to look at the number of logs that Vantage Report received from each device over a selected range of days. Vantage Report User’s Guide...
Page 534
They are sorted according to the number of logs received by each, in descending order. Click a device's MAC address to see details about the categories of logs that the device sent to Vantage Report on the selected days. Vantage Report User’s Guide...
13.3.1 Log Receiver > By Device > By Category Screen Use this screen to look at the number of logs that Vantage Report received according to the category of log (i.e., log type such as Login, Traffic log, etc.) from an individual device over a selected range of days.
13.4 VRPT System Logs Use this screen to view system, device and user information, events, scheduled reports and data maintenance records related to Vantage Report. Click Logs > Log Viewer > VRPT System Logs. The following screen displays. Figure 250 Logs > VRPT System Logs...
Page 537
Select what category type of log entries you want to see. You can also select All Categories. The categories are as follows: • System - See information about Vantage Report’s disk space. • Device - Check which devices were added, edited or removed in the Vantage Report.
These screens allow you to archive past logs to a preferred location (local directory, FTP or network server) as a ZIP file. You can set the day(s) or time interval when Vantage Report performs this task. You can view, import/export, or delete log archives for a particular device.
Page 539
DESCRIPTION Enable Archiving Click this to enable Vantage Report to archive log files. Zip Creation Interval: Set every which day or the time interval the Vantage Report archives the generated log files for record keeping. every... Days (1-7) Enable Encryption Select this if you want to encrypt archive files.
Page 540
Figure 253 on page 541 for descriptions of other table fields found in this screen. 13.5.1.2 Storage Server Use this screen to store archive files on a storage server, such as a Network Attached Storage (NAS) server. Vantage Report User’s Guide...
13.5.2 View Archived Files Use this screen to view archived logs for a particular day or range of days. Vantage Report imports the archived logs from the location where they are stored and enables you to view them in the web browser.
Page 542
DESCRIPTION Device This field displays the name of the devices that have archived logs on Vantage Report. You can also select All. Start Date Enter the date of the earliest log entries you want to see. You can also click the Calendar icon to specify the date.
Click a Transfer icon next to an archive entry in the Logs > Log Archiving > View Archived Files screen. The following screen displays. Figure 255 Logs > Log Archiving > View Archived Files Vantage Report User’s Guide...
Click this to send this mail to the specified e-mail addresses. 13.6 Log Remove Use this screen to purge logs collected over a specified period of time. This helps clear up space in Vantage Report. Click Logs > Log Remove. The following screen displays. Figure 256 Logs > Log Remove Each field is described in the following table.
• Export the current device panel to XML and import devices from XML • Upgrade to a new software release of Vantage Report • Register Vantage Report (You have to register Vantage Report if you want to get the trial version, upgrade to the full version, or increase the number of devices Vantage Report supports.)
Page 550
Vantage Report sends a notification to the e-mail address (if any) for the user account. root Stored Log Days Enter the number of days you want to store logs in Vantage Report before removing them. Language Choose Choose the language for the Vantage Report. Apply Click this to save your settings.
Besides enabling hostname, do the following to allow the hostname reverse function to work. Turn on hostname reverse in Vantage Report. Enable the default NetBIOS setting in the host computers. Configure any software firewalls installed on the host computers to allow NetBIOS packets from the Vantage server.
Page 552
For Windows Vista, click View status next to the Connection field. A screen appears and then click Properties. For Windows 7, click Local Area Connection and then click Properties. Figure 260 Windows XP: Control Panel: Network Connections: Properties Vantage Report User’s Guide...
Page 553
For Windows 2000, the Internet Protocol TCP/IP Properties window opens. Click Advanced and then the WINS tab. In Windows Vista/7, The Internet Protocol Version 4 (TCP/IPv4) Properties window opens, click Advanced and then the WINS tab. Figure 262 Windows XP: Advanced TCP/IP Settings: WINS Vantage Report User’s Guide...
SMTP IP Address Enter the IP address or domain name of the SMTP mail server on or Domain Name which Vantage Report has an account to send e-mail messages. Sender E-mails Enter the complete e-mail address for the Vantage Report account.
Send Test E-mail Note: You should click Apply before you click Test. to Administrator Click this to send a test message from the Vantage Report account to the e-mail address, if any, for the user account. root...
Backup Click this to look at or save the current settings in the General Configuration, Server Configuration, User Management, and Device List screens. Vantage Report saves the current settings in XML format. File Name / Enter the XML file name that contains the settings you want to Browse restore.
You can use this screen to export the current device panel to an XML file, or you can add devices stored in XML format to Vantage Report. To access this screen, click System Setting > Data Maintenance > Device List.
Chapter 14 System Setting Use this screen to install new releases of Vantage Report. Do not use this screen to upgrade to the full version. To access this screen, click System Setting > Upgrade. Figure 266 System Setting > Upgrade Each field is described in the following table.
To access this screen, click System Setting > Registration. Figure 267 System Setting > Registration The fields in this screen depend on what version (basic or full) of Vantage Report you have and whether or not you have used the registration screens to log into myZyXEL.com.
Otherwise, the Registration screen appears. 14.5.2 Registration > Upgrade Screen Note: The Vantage Report server must be connected to the Internet to use this screen. To access this screen, click Trial or Upgrade in System Setting > Registration.
14.6 Notification Use this screen to manage your Vantage Report notifications. Based on the monitoring data collected and the notifications you set, Vantage Report can send e-mail, E-mail SMS, and/or Web SMS notifications to you when events happen in monitored devices.
Page 562
Some choices are not available, depending on the number of pages. Enter the page number you want to see, and click Go. Click this to add the rule to the Vantage Report. Delete Select the check box(es) of the rule(s) you want to delete and then click this button.
Use this screen to create or edit a notification. Click Add or click a notification’s name in the System Setting > Notification screen to open the following screen. Figure 270 System Setting > Notification > Add/Edit Vantage Report User’s Guide...
Page 564
This shows the basic information for the notification. Email Email Status Select Active to enable the Vantage Report to send this type of notification to the configured e-mail address(es) in the Destination E-mail Address field. Alternatively, select Paused to disable it.
Click this to exit this screen without saving any changes. 14.7 Rule-Based Alert Use this screen to manage your Vantage Report alert system. Based on the monitoring data collected and the rules you set, Vantage Report can send e-mail notifications and keep you in the loop on events happening in monitored devices.
Some choices are not available, depending on the number of pages. Enter the page number you want to see, and click Go. Click this to add the rule to the Vantage Report. Delete Select the check box(es) of the rule(s) you want to delete and then click this button.
Page 567
Note: These condition filters only apply to the ZLD platform type. In case you want to know how much of the system resources are being used by the monitored devices, use this screen to configure a rule for CPU, memory and session usage conditions. Vantage Report User’s Guide...
Page 568
Click this if you want all criteria to apply before Vantage Report sends following out a notification. Match any of the Click this if you want Vantage Report to send out a notification even if following only one criteria has been met. Alert Setting Vantage Report sends out a notification immediately as soon as conditions set in the rule are detected.
Page 569
Table 252 System Setting > Rule-based Alert > Add/Edit > CPU/Memory/Session Usage LABEL DESCRIPTION Second Alert Specify when you want Vantage Report to send a second e-mail after.. minutes notification. Enter the number of minutes between 1 to 60. Enter 0 to disable this. Third alert after..
Page 570
Using the previous example, you can set the period to 5 minutes. This means that if the device reaches or exceeds 100 KByte/s of outgoing port traffic for 5 minutes, Vantage Report sends out an alert. Section Table 252 on page 568 for descriptions of other table fields found in this screen.
Page 571
Using the previous example, you can set the period to 5 minutes. This means that if the device reaches or exceeds 100 KByte/s of interface traffic for 5 minutes, Vantage Report sends out an alert. Section Table 252 on page 568 for descriptions of other table fields found in this screen.
Page 572
Table 255 System Setting > Rule-based Alert > Add/Edit > Service LABEL DESCRIPTION Condition Select Service in this field. Interface Type Select which service type you want to monitor. Choose one of the following. • WEB • FTP • MAIL • IPSec VPN • SSL VPN Vantage Report User’s Guide...
Page 573
For example, choose MAIL, select >= and set the percentage value to 100 KByte/s. This means Vantage Report sends an alert once a monitored device uses or exceeds 100 KBytes for mail for a set time (see Period..
Page 574
For example, choose Attack, select >= and set the percentage value to 5. This means Vantage Report sends an alert once a monitored device receives 5 attacks for a set time (see Period..
Page 575
For example, select >= and set the percentage value to 100 KByte/s. This means Vantage Report sends an alert once a monitored device uses or exceeds 100 KBytes/s bandwidth for a set time (see Period.. minutes field below).
Page 576
Chapter 14 System Setting Vantage Report User’s Guide...
The root account or accounts in the 'super' group can use these screens to view, add, edit, or remove Vantage Report groups and users. Other users can only use these screens to look at and edit their user settings, including their password. The screens are the same except where noted below.
This field displays the type of the user group. • Super displays if the group has read/write/execute permissions for all Vantage Report screens. • Normal displays if the group has read/write permissions for the Monitor, Report and Logs > Log Reviewer screens.
Click this to return to the previous screen without saving any changes. 15.2 Account Screen Use the Account screen to manage user accounts for Vantage Report. Click User Management > Account to open the Account screen. Figure 280 User Management > Account...
Click this to delete the user accounts that are selected in Index field. If a user is currently logged in, the user is kicked out of the system the next time the session accesses the Vantage Report server. 15.2.1 Account > Add/Edit User Account Screen Use this screen to add or edit a user account.
Page 581
Apply Click this to save your settings and close the screen. Reset Click this to change the settings in this screen to the last-saved values. Cancel Click this to close the screen without saving any changes. Vantage Report User’s Guide...
Page 582
Chapter 15 User Management Vantage Report User’s Guide...
H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. I cannot start the Vantage Report sever. Make sure the following system variables are defined. PATH=%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem Do the following to check these variables in different operating systems.
Page 584
Vantage Report server, especially if the Vantage Report server runs behind a NAT or firewall. Check the amount of available disk space on the Vantage Report server. If it is less than the value in...
Page 585
• In Firefox, click Tools > Options > Privacy > Cache > Clear Cache Now. • In Mozilla, click Edit > Preferences > Privacy > Cache > Clear. Close your browser and open a new web configurator session. The version number should be updated. Vantage Report User’s Guide...
Appendices and Index Product Specifications (589) ZyWALL USG Series and ZyWALL 1050 Log Descriptions (599) ZyNOS Log Descriptions (645) Open Software Announcements (671) Legal Information (709) Index (711)
Maximum number of logs for each device 15,000,000 Warning: Maximum number of logs for each device 10,000,000 Minimum amount of free disk space required to run Vantage Report 800 MB Warning: Minimum amount of free disk space required to run Vantage Per Low free disk Report Mark.
Page 590
Get a quick top level summary of activity across devices. You can also easily drill-down to get more details on any area of interest. Select which reports or monitors you want Vantage Report to display first when you login. Customizable Reports Display company logos, record information and edit report titles to match customer accounts.
Page 591
Appendix A Product Specifications The following tables list which features Vantage Report supports with various firmware versions of various devices. Table 267 VRPT 3.6 Feature Support for USG Series and ZyWALL 1050 Devices ZYWALL 1050 / ZYWALL USG MENU ITEM 1.01 / 2.00 /...
Page 592
Session Per Host Schedule Report Summary Configure Template Logo Template Log Viewer Log Receiver VRPT System Logs Log Archiving Log Remove A. ZyWALL USG series includes ZyWALL 100 / 200 / 300 / 1000 / 2000. Vantage Report User’s Guide...
Page 593
Intrusion AntiVirus AntiSpam Report > Traffic Bandwidth Summary Top Protocols Top Hosts Top Users Destinations Top Sites Top Hosts Top Users Top Sites Top Hosts Top Users MAIL Top Sites Top Hosts Top Users Customization Customization Vantage Report User’s Guide...
Page 594
Top Hosts Top Users Destinations Remote Access (IPSec) User Status Top Protocols Destinations Top Users Remote Access (SSL) User Status Top Protocols Destinations Applications Top Users Xauth Successful Login Failed Login Report > Network Attack Attack Summary Vantage Report User’s Guide...
Page 595
(N/A for ZyWALL P1) Top Senders (N/A for ZyWALL P1) Top Sources (N/A for ZyWALL P1) Report > Security Policy Firewall Access Control Top Users Blocked Top Packets Blocked Application Access Control Applications Blocked Top Users Blocked Vantage Report User’s Guide...
Page 596
Login Failed Login Sessions Per Host Top Hosts Top Users Report > Report > Schedule Report Summary Configure Template Logo Template Logs Log Viewer Log Receiver By Day (Summary) By Device VRPT System Logs Log Archiving Vantage Report User’s Guide...
%s: website host The device allowed access to a web site. The content filtering %s: Service is not service is unregistered and the default policy is not set to registered block. %s: website host Vantage Report User’s Guide...
Page 600
The web site contains Java applet and access was blocked %s: Contains Java according to a profile. applet %s: website host The web site contains a cookie and access was blocked %s: Contains cookie according to a profile. %s: website host Vantage Report User’s Guide...
Page 601
The specified user was signed out by the device due to a re- %s %s from %s has been authentication timeout. logged out (re-auth timeout) 1st %s: Administrator|Limited-Admin|User|Ext-User|Guest 2nd %s: username 3rd %s: service name (HTTP/HTTPS, FTP, telnet, SSH, console) NOTE field: %s means username. Vantage Report User’s Guide...
Page 602
The device blocked a login because the maximum Failed %s login simultaneous login capacity for the administrator or access attempt (reach the account has already been reached. maximum number of simultaneous logon) %s: service name Vantage Report User’s Guide...
Page 603
Standard service activation failed, this log will append an error Standard service message returned by the MyZyXEL.com server. activation has failed:%s. %s: error message returned by the myZyXEL.com server Standard service activation has succeeded. Standard service activation has succeeded. Vantage Report User’s Guide...
Page 604
The device sent packets to the MyZyXEL.com server, but did Get server response not receive a response. The root cause may be that the has failed. connection is abnormal. Vantage Report User’s Guide...
Page 605
%d: retry times (1~3) The device could not resolve the myZyXEL.com server's FQDN Resolve server IP has to an IP address through gethostbyname(). failed. The device could not connect to the MyZyXEL.com server. Connect to MyZyXEL.com server has failed. Vantage Report User’s Guide...
Page 606
MyZyXEL.com server or by the device’s own count. The device only supports SSLv3 protocol. %d: SSL version Unknown TLS/SSL assigned by client. version: %d. Vantage Report User’s Guide...
Page 607
System internal error. Get IDP engine activation flag failed. System internal error. Detect IDP engine status failed. Enable IDP engine activation flag failed. System internal error. Enable IDP failed. Disable IDP engine activation flag failed. System internal error.Disable IDP failed. Vantage Report User’s Guide...
Page 608
<line>, sid <sid>, <error_message>. Custom signature replacing failed. Error line number of file, Custom signature sid and message will be shown replace error: line <line>, sid <sid>, <error_message>. Vantage Report User’s Guide...
Page 610
Application patrol zysh initialization failed. Protocol file import System fatal error: error. 60005001. Application patrol zysh initialization failed. Shared memory System fatal error: failed. 60005002. Application patrol zyio failed. Fail to do zyio operation. System fatal error: 60005017. Vantage Report User’s Guide...
Page 611
System fatal error: 60018014. Fail to retrieve user event from uamd. System fatal error: 60018015. Application patrol daemon (process) shared memory generate System fatal error: failed. 60018016. Fail to get share memory. System fatal error: 60018017. Vantage Report User’s Guide...
Page 612
Table 276 IKE Logs LOG MESSAGE DESCRIPTION %s:%s is the peer IP:Port. Peer has not announced capability. %s:%s has not announced DPD capability Cannot find SA according to the cookie. [COOKIE] Invalid cookie, no sa found Vantage Report User’s Guide...
Page 613
[SA] : Tunnel [%s] was not a ISKAMP packet in the protocol field. Phase 1 invalid protocol %s is the tunnel name. When negotiating Phase-1, the [SA] : Tunnel [%s] transform ID was invalid. Phase 1 invalid transform Vantage Report User’s Guide...
Page 614
Could not dial manual dialed. key tunnel "%s" When receiving a DPD response with invalid ID ignored. DPD response with invalid ID When receiving a DPD response with no active query. DPD response with no active request Vantage Report User’s Guide...
Page 615
%s is the tunnel name. The device received an IKE request. Tunnel [%s] Recving IKE request %s is the tunnel name. The device sent an IKE request. Tunnel [%s] Sending IKE request Vantage Report User’s Guide...
Page 616
Sending IKE request The variables represent the tunnel name and the SPI of a Tunnel [%s:0x%x] is tunnel that was disconnected. disconnected %s is the tunnel name. The tunnel was rekeyed successfully. Tunnel [%s] rekeyed successfully Vantage Report User’s Guide...
Page 617
3rd is the to zone, 4th is the service name, 5th is ACCEPT/ DROP/REJECT. Firewall is dead, trace to %s is which file, %d is which line, %s %s:%d: in %s(): is which function %s is enabled/disabled Firewall has been %s. Vantage Report User’s Guide...
Page 618
%d is maximum sessions per host. Maximum sessions per host (%d) was exceeded. Table 280 Policy Route Logs LOG MESSAGE DESCRIPTION Policy routing can't activate BWM feature. Cann't open bwm_entries Policy routing can't detect link up/down status. Cann't open link_down Vantage Report User’s Guide...
Page 619
1st %d: the original policy route rule number 2nd %d: the new policy route rule number Rule is deleted. Policy-route rule %d was deleted. %d: the policy route rule number Policy routing rules are cleared. Policy-route rules were flushed. Vantage Report User’s Guide...
Page 620
FTP port has been changed to port %s. %s is port number assigned by user An administrator changed the port number for FTP back to the FTP port has been default (21). changed to default port. Vantage Report User’s Guide...
Page 621
An administrator added a new rule. DNS access control rule %u of DNS has %u is rule number been appended. An administrator inserted a new rule. DNS access control rule %u has been %u is rule number inserted. Vantage Report User’s Guide...
Page 622
32. The maximum number of allowable rules has been reached. Access control rules of %s have reached the %s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET. maximum number of %u %u is the maximum number of access control rules. Vantage Report User’s Guide...
Page 623
A daemon (process) is gone (was killed by the operating %s is dead at %s system). 1st %s: Daemon Name, 2nd %s: date+time The count of the listed process is incorrect. %s process count is incorrect at %s 1st %s: Daemon Name, 2nd %s: date+time Vantage Report User’s Guide...
Page 624
IP address. arp response packets for the requested IP address The ARP cache was cleared successfully. Clear arp cache successfully. A client MAC address is not an Ethernet address. Client MAC address is not an Ethernet address Vantage Report User’s Guide...
Page 625
2nd %s is the FQDN of the profile. has failed because the FQDN %s was blocked for abuse. Try to update profile, but failed, because of authentication fail, Update the profile %s %s is the profile name. has failed because of authentication fail. Vantage Report User’s Guide...
Page 626
The profile is paused by device-HA, because the VRRP status The profile %s has of that iface is standby, %s is the profile name. been paused because the VRRP status of WAN interface was standby. Vantage Report User’s Guide...
Page 627
Disable DDNS. Disable DDNS has succeeded. Enable DDNS. Enable DDNS has succeeded. Rename DDNS profile, 1st %s is the original profile name, 2nd DDNS profile %s has %s is the new profile name. been renamed as %s. Vantage Report User’s Guide...
Page 628
%s: the connectivity module, currently only ICMP available. The connectivity check process can't get socket to send Create socket error packet. The connectivity check process can't get IP address of Can't get IP address interface. of %s interface %s: interface name. Vantage Report User’s Guide...
Page 629
An VRRP group has been modified, %s: the name of VRRP Device HA VRRP group group. %s has been modified. An VRRP group has been deleted, %s: the name of VRRP Device HA VRRP group group. %s has been deleted. Vantage Report User’s Guide...
Page 630
Master. A Backup device only version can not be synchronizes from the Master if the Master and the Backup recognized. Stop have the same firmware versions. syncing from Master. Vantage Report User’s Guide...
Page 631
%s has succeeded. %s: IP or FQDN of Master One of VRRP groups has became active. Device HA Sync has aborted from Master %s. Master configuration file does not exist. Skip updating ZySH Startup Configuration. Vantage Report User’s Guide...
Page 632
RIP md5 authentication id and key have been changed. RIP md5 authentication id and key have been changed. RIP global version has been changed to version 1 or 2. RIP global version has been changed to %s. Vantage Report User’s Guide...
Page 633
%s. 1st %s: Interface Name, 2nd %s: RIP interface %s has been reset to current global version %s. RIP v2-broadcast on interface %s has been disabled. %s: RIP v2-broadcast on Interface Name interface %s has been disabled. Vantage Report User’s Guide...
Page 634
The FTP Application Layer Gateway (ALG) has been turned on %s FTP ALG has or off. succeeded. %s: Enable or Disable Extra FTP ALG port has been changed. Extra signal port of FTP ALG has been modified. Vantage Report User’s Guide...
Page 635
X509certifiate "%s" successfully The router was not able to create an X509 format certificate Generate X509 with the specified name. See Table 256 on page 637 certificate "%s" details about the error number. failed, errno %d Vantage Report User’s Guide...
Page 636
Certificates. %s is the certificate request name. certificate "%s" into "My Certificate" successfully The device imported a PKCS#7 format certificate into My Import PKCS#7 Certificates. %s is the certificate request name. certificate "%s" into "My Certificate" successfully Vantage Report User’s Guide...
Page 637
Table 256 on page 637), %s is the Due to %d, cert not certificate subject. trusted: %s CODE DESCRIPTION Algorithm mismatch between the certificate and the search constraints. Key usage mismatch between the certificate and the search constraints. Vantage Report User’s Guide...
Page 638
AUX Interface dialing not enabled. failed. This AUX interface is not enabled. The AUX interface is not enabled and a user tried to use the AUX Interface disconnect aux command. disconnecting failed. This AUX interface is not enabled. Vantage Report User’s Guide...
Page 639
At this time the configuration will be down. Default route saved but route will not take effect until the link becomes will not apply until up.1st %s: interface name, 2nd %s: interface name. interface %s links up. Vantage Report User’s Guide...
Page 640
PAP authentication failed (the server must support PAP and Interface %s connect verify verify that the authentication failed, this does not failed: PAP include cases where the server does not support PAP). %s: authentication failed. PPP interface name. Vantage Report User’s Guide...
Page 641
DHCP client and has more than one member in its client. group. In this case the DHCP client will renew. %s: interface name. An administrator configured port-grouping, %s: interface Port Grouping %s has name. been changed. Vantage Report User’s Guide...
Page 642
Resetting system... After the system reset, it started to apply the configuration System resetted. Now file. apply %s.. %s is configuration file name. An administrator ran the listed shell script. Running %s... %s is script file name. Vantage Report User’s Guide...
Page 643
Operating System. A user’s computer failed to pass an EPS checking item about Windows version check the Windows version. fail in %s A user’s computer passed all the EPS checking items. EPS checking result is pass. Vantage Report User’s Guide...
Page 644
Appendix B ZyWALL USG Series and ZyWALL 1050 Log Descriptions Vantage Report User’s Guide...
Time initialized by Time server The router got the time and date from the NTP server. Time initialized by NTP server The router was not able to connect to the Daytime Connect to Daytime server server. fail Vantage Report User’s Guide...
Page 646
The myZyXEL.com service registration failed due to the error listed. If you are unable to register for services at myZYXEL.com, the error message displayed in this log may be useful when contacting customer support. Vantage Report User’s Guide...
Page 647
[ TCP | UDP | IGMP | ESP | GRE | OSPF ] The router blocked a packet that didn't have a Packet without a NAT table entry corresponding NAT table entry. blocked: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] Vantage Report User’s Guide...
Page 648
UDP idle timeout: 3 minutes TCP connection (three way handshaking) timeout: 270 seconds TCP FIN-wait timeout: 2 MSL (Maximum Segment Lifetime set in the TCP header). TCP idle (established) timeout (s): 150 minutes TCP reset timeout: 10 seconds Vantage Report User’s Guide...
Page 649
The firewall does not support this kind of ICMP Unsupported/out-of-order ICMP: packets or the ICMP packets are out of order. ICMP The router sent an ICMP reply packet to the Router reply ICMP packet: ICMP sender. Vantage Report User’s Guide...
Page 650
The PPP connection’s Link Control Protocol stage is closing. ppp:LCP Closing The PPP connection’s Internet Protocol Control Protocol stage is ppp:IPCP Closing closing. Table 302 UPnP Logs LOG MESSAGE DESCRIPTION UPnP packets can pass through the firewall. UPnP pass through Firewall Vantage Report User’s Guide...
Page 651
The Vantage Report cannot get the IP address of the external DNS resolving failed content filtering via DNS query. Creating socket failed The Vantage Report cannot issue a query because TCP/IP socket creation failed, port:port number. The connection to the external content filtering server failed.
Page 652
ICMP Time Exceed ICMP The firewall detected an ICMP Destination Unreachable ICMP Destination attack. Unreachable ICMP The firewall detected an ICMP ping of death attack. ping of death. ICMP The firewall detected an ICMP smurf attack. smurf ICMP Vantage Report User’s Guide...
Page 653
The MAC filter blocked a wireless station from connecting WLAN MAC Filter Fail to the device. The MAC filter allowed a wireless station to connect to WLAN MAC Filter Success the device. A wireless station associated with the device. WLAN STA Association Vantage Report User’s Guide...
Page 654
2 SAs has been exceeded reached. Phase 2 Quick Mode has started. Start Phase 2: Quick Mode The connection failed during IKE phase 2 because the Verifying Remote ID failed: router and the peer’s Local/Remote Addresses don’t match. Vantage Report User’s Guide...
Page 655
Mode request from <IP> The router started negotiation with the peer. Send <Main or Aggressive> Mode request to <IP> The peer’s “Local IP Address” is invalid. Invalid IP <Peer local> / <Peer local> Vantage Report User’s Guide...
Page 656
Rule[%d] Phase 1 negotiation match between the router and the peer. mode mismatch The listed rule’s IKE phase 1 encryption algorithm did Rule [%d] Phase 1 encryption not match between the router and the peer. algorithm mismatch Vantage Report User’s Guide...
Page 657
The listed rule’s IKE phase 1 did not match between Rule [%d] phase 1 mismatch the router and the peer. The listed rule’s IKE phase 2 did not match between Rule [%d] phase 2 mismatch the router and the peer. Vantage Report User’s Guide...
Page 658
IP [%s] is changed to %s" address. The IP address for the domain name of the Vantage New My Vantage Report Addr in Report in the listed rule changed to the listed IP rule [%s] is changed to %s address.
Page 659
Certificate was not added to the cache. Certificate decoding failed. Certificate was not found (anywhere). Certificate chain looped (did not find trusted root). Certificate contains critical extension that was not handled. Certificate issuer was not valid (CA specific information missing). Vantage Report User’s Guide...
Page 660
The router logged out a user from which there was User logout because of no no authentication response. authentication response from user. The router logged out a user whose idle timeout User logout because of idle period expired. timeout expired. Vantage Report User’s Guide...
Page 661
(L to L/ZW) LAN to LAN/ ACL set for packets travelling from the LAN to the Vantage Report LAN or the Vantage Report. (W to W/ZW) WAN to WAN/ ACL set for packets travelling from the WAN to the Vantage Report WAN or the Vantage Report.
Page 662
ACL set for packets travelling from the WLAN to the DMZ. (WL to WL) WLAN to WLAN/ ACL set for packets travelling from the WLAN to Vantage Report the WLAN or the Vantage Report. Table 312 ICMP Notes TYPE CODE DESCRIPTION Echo Reply...
Page 663
The device attempted to check for the latest available signature Check signature version. %s gives details. Either the check was unsuccessful due version - %s. to the server being busy or the device is already using the latest available firmware. Vantage Report User’s Guide...
Page 664
Internet. %s describes the reason for the error. You may need to update - %s! provide the error message when contacting customer support if you are repeatedly unable to download the signature file from the update server. Vantage Report User’s Guide...
Page 665
Spam Score:%d Mail than or equal to the spam score threshold. From:%EMAIL_ADDRESS% Subject:%MAIL_SUBJECT%!%MAIL_DIRECTIO The number of concurrent mail sessions Exceed maximum mail sessions went over the limit (%d). (%d).%MAIL_DIRECTION% Vantage Report User’s Guide...
Page 666
(D to D) (D to W2) (D to WL) WAN2 (W2 to L) (W2 to (W2 to D) (W2 to W2) (W2 to WLAN (WL to L) (WL to (WL to D) (WL to W2) (WL to Vantage Report User’s Guide...
Page 667
"Traffic Log". The "proto" field lists the service msg="Traffic Log" name. The "dir" field lists the incoming and outgoing note="Traffic Log" devID="<mac interfaces ("LAN:LAN", "LAN:WAN", "LAN:DMZ", address>" cat="Traffic Log" "LAN:DEV" for example). duration=seconds sent=sentBytes rcvd=receiveBytes dir="<from:to>" protoID=IPProtocolID proto="serviceName" trans="IPSec/Normal" Vantage Report User’s Guide...
Page 668
The definition of dst="<dstIP:dstPort>" messages and notes are defined in the IDP ob="<0|1>" ob_mac="<mac categories. address>" msg="<msg>" note="<note>" devID="<mac address>" cat="IDP" class="<idp class>" act="<idp action>" sid="<idp sid> count="1" Vantage Report User’s Guide...
Page 669
Please refer to the RFC for detailed information on each type. Table 319 RFC-2408 ISAKMP Payload Types LOG DISPLAY PAYLOAD TYPE Security Association Proposal PROP Transform TRANS Key Exchange Identification Certificate Certificate Request CER_REQ Hash HASH Signature Nonce NONCE Notification NOTFY Delete Vendor ID Vantage Report User’s Guide...
Free Software Foundation's software and to any other program whose authors commit to using it.(Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. Vantage Report User’s Guide...
Page 672
To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. Vantage Report User’s Guide...
Page 673
Section 1 above, provided that you also meet all of these conditions: a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. Vantage Report User’s Guide...
Page 674
3.You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: Vantage Report User’s Guide...
Page 675
Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. Vantage Report User’s Guide...
Page 677
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/ OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, Vantage Report User’s Guide...
Page 678
"copyright" line and a pointer to where the full notice is found. ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES. Copyright (C) YYYY NAME OF AUTHOR Vantage Report User’s Guide...
Page 679
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Vantage Report User’s Guide...
Page 680
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. Vantage Report User’s Guide...
Page 681
Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Vantage Report User’s Guide...
Page 682
For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/ Linux operating system. Vantage Report User’s Guide...
Page 683
For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Vantage Report User’s Guide...
Page 684
You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. Vantage Report User’s Guide...
Page 685
General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Vantage Report User’s Guide...
Page 686
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if Vantage Report User’s Guide...
Page 687
Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) Vantage Report User’s Guide...
Page 688
7. You may place library facilities that are a work based on the Library side-by- side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate Vantage Report User’s Guide...
Page 689
(whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations Vantage Report User’s Guide...
Page 690
Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you Vantage Report User’s Guide...
Page 691
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Vantage Report User’s Guide...
Page 692
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. Vantage Report User’s Guide...
Page 693
SELECT THE "DECLINE" BUTTON AT THE BOTTOM OF THE AGREEMENT AND THE DOWNLOAD OR INSTALL PROCESS WILL NOT CONTINUE. 1. DEFINITIONS. "Software" means the identified above in binary form, any other machine readable materials (including, but not limited to, libraries, source files, Vantage Report User’s Guide...
Page 694
This limited warranty gives you specific legal rights. You may have others, which vary from state to state. 5. DISCLAIMER OF WARRANTY. UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A Vantage Report User’s Guide...
Page 695
("Sun Marks"), and you agree to comply with the Sun Trademark and Logo Usage Requirements currently located at http://www.sun.com/policies/trademarks. Any use you make of the Sun Marks inures to Sun's benefit. Vantage Report User’s Guide...
Page 696
Binary Code License Agreement. These Supplemental Terms shall supersede any inconsistent or conflicting terms in the Binary Code License Agreement, or in any license contained within the Software. Vantage Report User’s Guide...
Page 697
Agreement, (vi) you agree to defend and indemnify Sun and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that Vantage Report User’s Guide...
Page 698
Software and/or the Publication. Your obligation to provide indemnification under this section shall arise provided that Sun: (i) provides you prompt notice of the claim; (ii) gives you sole control of the defense and Vantage Report User’s Guide...
Page 699
All source code, binaries, documentation and other files distributed with Quartz Enterprise Job Scheduler are subject to the following license terms, and are held under the following copyright, unless otherwise noted within the individual files. Copyright James House (c) 2001-2004 Vantage Report User’s Guide...
Page 700
This product uses and includes within its distribution, software developed by the Apache Software Foundation (http://www.apache.org/) This Product includes Stuts and Tomcat under Apache License Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION Vantage Report User’s Guide...
Page 701
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). Vantage Report User’s Guide...
Page 702
Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution Vantage Report User’s Guide...
Page 703
Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. Vantage Report User’s Guide...
Page 704
License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Vantage Report User’s Guide...
Page 705
GPL, LGPL, Sun Microsystems, Inc. Binary Code License, Quarz License and Apache License. To obtain the source code covered under those Licenses, please contact ZyXEL Communications Corporation at: ZyXEL Technical Support. This source code is free to download at http://www.zyxel.com End-User License Agreement for “Vantage VRPT 3.4”...
Page 706
Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. Vantage Report User’s Guide...
Page 707
LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND Vantage Report User’s Guide...
Page 708
If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. Vantage Report User’s Guide...
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Note: Refer also to the Open Software Announcements on page 671.
Page 710
Please read the license screen in the installation wizard. You must accept the terms of the license in order to install Vantage. Note: Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com North American products. Vantage Report User’s Guide...
Page 713
CPU usage platform E-Mail anti-spam E-Mail anti-virus port number E-Mail intrusions port usage end time monitors graph print icon interface usage printing intrusions monitors Vantage Report User’s Guide...
Page 714
522, 523 processing time weekly right-click Secure Remote Access settings IPSec table Site-to-Site title typical layout security issues web security anti-virus E-Mail web traffic Vantage Report User’s Guide...
Page 715
See configuration. system information summary e-mail port number system notification processing time low free disk mark setting source data starting stopping time Vantage Report users. See users. templates 522, 523 version time license clock time full processing time upgrade title bar...
Page 716
ZyXEL device corresponding configuration device type setting edit basic information feature support MAC setting 40, 53 model name move remove searching device select source data, see source data. view basic information ZyXEL devices in typical application Vantage Report User’s Guide...
Need help?
Do you have a question about the Vantage Report and is the answer not in the manual?
Questions and answers