Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Measuring Instruments
VANTAGE REPORT 2.3 -
ZyXEL Communications VANTAGE REPORT 2.3 - Manuals
Manuals and User Guides for ZyXEL Communications VANTAGE REPORT 2.3 -. We have
4
ZyXEL Communications VANTAGE REPORT 2.3 - manuals available for free PDF download: User Manual, Quick Start Manual, Datasheet
ZyXEL Communications VANTAGE REPORT 2.3 - User Manual (716 pages)
User Guide
Brand:
ZyXEL Communications
| Category:
Software
| Size: 15.97 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Table of Contents
7
Contents Overview
7
Table of Contents
9
Introduction
19
PART I Introduction
19
Chapter 1 Introducing Vantage Report
21
Introduction
21
License Versions
22
Hardware Requirements
22
Chapter 2 The Vantage Report Server
23
Starting and Stopping the Vantage Report Server
23
E-Mail in the Vantage Report Server
24
Time in the Vantage Report Server
25
Common Terms
25
Common Icons
27
Zyxel Device Configuration and Source Data
27
Chapter 3 The Web Configurator
33
Web Configurator Requirements
33
Web Configurator Access
33
Main Menu Bar
37
The about Screen
37
Device Window
37
Menu Panel
41
Report and Setting Window
52
Device Information Screen
53
Monitors and Statistical Reports
54
View Logs
59
System Dashboard
59
Monitors, Reports and Logs
63
Part II: Monitors, Reports and Logs
63
Monitor
65
Monitor (Folder)
65
Customize the Column Fields
66
Dashboard
67
Dashboard
69
CPU Usage Monitor
71
Memory Usage Monitor
72
Session Usage Monitor
73
Port Usage Monitor
74
Interface Usage Monitor
75
Web Monitor
77
FTP Monitor
78
E-Mail Monitor
79
Site to Site (Ipsec) VPN Monitor
80
Client to Site (Ipsec) VPN Monitor
81
Client to Site (SSL) VPN Monitor
82
Firewall Access Control Monitor
83
Attack Monitor
84
Intrusion Hits
85
Anti-Virus Monitor
86
E-Mail Virus Found Monitor
87
Spam Monitor
88
E-Mail Intrusion Hits Monitor
89
Web Security - Security Threat Monitor
90
Web Security Virus Found Monitor
91
Web Security Intrusion Hits Monitor
92
Content Filter Monitor
93
Application Patrol Monitor
94
Network Traffic
95
Chapter 4 Monitor
65
Bandwidth
95
Bandwidth Summary
95
Chapter 5 Network Traffic
95
Bandwidth Summary Drill-Down
99
Bandwidth Top Protocols
100
Bandwidth Top Protocols Drill-Down
104
Top Bandwidth Hosts
106
Top Bandwidth Hosts Drill-Down
110
Top Bandwidth Users
112
Top Bandwidth Users Drill-Down
115
Top Bandwidth Destinations
117
Top Bandwidth Destinations Drill-Down
121
Top Web Sites
123
Web Traffic
123
Top Web Sites Drill-Down
126
Top Web Hosts
128
Top Web Hosts Drill-Down
131
Top Web Users
133
Top Web Users Drill-Down
136
FTP Traffic
138
Top FTP Sites
138
Top FTP Sites Drill-Down
141
Top FTP Hosts
143
Top FTP Hosts Drill-Down
146
Top FTP Users
148
Top FTP Users Drill-Down
151
Mail Traffic
153
Top Mail Sites
153
Top Mail Sites Drill-Down
156
Top Mail Hosts
158
Top Mail Hosts Drill-Down
161
Top Mail Users
163
Top Mail Users Drill-Down
166
Other Traffic
168
Platform Selection
169
Service Settings
169
Top Destinations of Other Traffic
170
Top Destinations of Other Traffic Drill-Down
173
Top Sources of Other Traffic
174
Top Sources of Other Traffic Drill-Down
177
Top Other Traffic Users
178
Top Users of Other Traffic Drill-Down
181
Chapter 6 Secure Remote Access
183
Secure Remote Access - Site-To-Site (Ipsec)
183
Secure Remote Access Link Status
183
Secure Remote Access Traffic Monitor
185
Top VPN Peer Gateways
186
Top VPN Peer Gateways Drill-Down
189
Top Secure Remote Access Sites
191
Top Secure Remote Access Sites Drill-Down
194
Top Secure Remote Access Tunnels
196
Top Secure Remote Access Tunnels Drill-Down
199
Top Secure Remote Access Protocols
201
Top Secure Remote Access Protocols Drill-Down
204
Top Secure Remote Access Hosts
206
Top Secure Remote Access Hosts Drill-Down
210
Top Secure Remote Access Users
212
Top Secure Remote Access Users Drill-Down
215
Top Secure Remote Access Destinations
217
Top Secure Remote Access Destinations Drill-Down
220
Secure Remote Access - Client-To-Site (Ipsec)
222
Secure Remote Access User Status
223
Secure Remote Access User Status Drill-Down
225
Top Secure Remote Access Protocols
227
Top Secure Remote Access Protocols Drill-Down
230
Top Secure Remote Access Destinations
232
Top Secure Remote Access Destinations Drill-Down
235
Secure Remote Access Top Users
237
Secure Remote Access Top Users Drill-Down
240
Secure Remote Access - Client-To-Site (SSL)
242
Secure Remote Access User Status
243
Secure Remote Access User Status Drill-Down
245
Top Secure Remote Access Protocols
246
Top Secure Remote Access Protocols Drill-Down
249
Top Secure Remote Access Destinations
251
Top Secure Remote Access Destinations Drill-Down
254
Top Secure Remote Access Applications
256
Top Secure Remote Access Applications Drill-Down
259
Secure Remote Access Top Users
261
Secure Remote Access Top Users Drill-Down
263
Secure Remote Access Successful Login
265
Xauth
265
Secure Remote Access Failed Login
267
Virus Found
333
Virus Found Summary
333
Virus Found Summary Drill-Down
336
Top Viruses
337
Top Viruses Drill-Down
340
Top Virus Sources
341
Top Virus Sources Drill-Down
344
Top Virus Destinations
346
Top Virus Destinations Drill-Down
348
Spam
349
Spam Summary
349
Spam Summary Drill-Down
352
Top Spam Senders
353
Top Spam Sources
356
Spam Scores
359
Intrusion Hits
361
Intrusion Hits Summary
361
Intrusion Hits Summary Drill-Down
363
Top Intrusion Hits Signatures
365
Top Intrusion Hits Signatures Drill-Down
367
Top Intrusion Hits Sources
368
Top Intrusion Hits Sources Drill-Down
371
Top Intrusion Hits Destinations
373
Top Intrusion Hits Destinations Drill-Down
376
Intrusion Hits Severities
378
Intrusion Hits Severities Drill-Down
380
Web Security
383
Chapter 7 Network Security
269
Firewall Access Control
269
Network Security
269
Top Users Blocked
269
Top Packets Blocked
272
Attack
275
Attack Summary
275
Attack Summary Drill-Down
278
Top Attacks
279
Top Attacks Drill-Down
282
Top Attack Sources
283
Top Attack Sources Drill-Down
286
Attack Types
288
Attack Types Drill-Down
290
Intrusion Hits
291
Intrusion Hits Summary
291
Intrusion Hits Summary Drill-Down
294
Top Intrusion Hits Signatures
296
Top Intrusion Hits Signatures Drill-Down
299
Top Intrusion Hits Sources
301
Top Intrusion Hits Sources Drill-Down
304
Top Intrusion Hits Destinations
306
Top Intrusion Hits Destinations Drill-Down
309
Intrusion Hits Severities
311
Intrusion Hits Severities Drill-Down
314
Antivirus
315
Antivirus Summary
315
Virus Summary Drill-Down
318
Top Viruses
319
Top Viruses Drill-Down
322
Top Virus Sources
323
Top Virus Sources Drill-Down
326
Top Virus Destinations
328
Top Virus Destinations Drill-Down
330
Chapter 8 E-Mail Security
333
E-Mail Security
333
Chapter 9 Web Security
383
Security Threat
383
Security Threat Summary
383
Security Threat Summary Drill-Down
385
Security Threat Top Web Sites
387
Security Threat Top Sites Drill-Down
390
Security Threat Top Users
391
Security Threat Top Users Drill-Down
394
Security Threat Top Hosts
395
Security Threat Top Hosts Drill-Down
398
Security Threat Categories
399
Security Threat Categories Drill-Down
401
Virus Found
403
Virus Found Summary
403
Virus Found Summary Drill-Down
406
Top Viruses
407
Top Viruses Drill-Down
409
Top Virus Sources
410
Top Virus Sources Drill-Down
413
Top Virus Destinations
414
Top Virus Destinations Drill-Down
417
Intrusion Hits
418
Intrusion Hits Summary
418
Intrusion Hits Summary Drill-Down
421
Top Intrusion Hits Signatures
423
Top Intrusion Hits Signatures Drill-Down
426
Top Intrusion Hits Sources
428
Top Intrusion Hits Sources Drill-Down
431
Top Intrusion Hits Destinations
433
Top Intrusion Hits Destinations Drill-Down
436
Intrusion Hits Severities
438
Intrusion Hits Severities Drill-Down
440
Chapter 10 Security Policy Enforcement
443
Eps
443
What Endpoint Security Can Check
443
EPS Summary
444
View Logs
445
Content Filter (All)
446
Summary
446
Summary Drill-Down
448
Top Sites
450
Top Sites Drill-Down
453
Top Users
455
Top Users Drill-Down
458
Top Hosts
459
Top Hosts Drill-Down
462
By Category
463
By Category Drill-Down
466
Content Filter (Blocked)
467
Summary
467
Summary Drill-Down
469
Top Blocked Sites
471
Top Blocked Sites Drill-Down
474
Top Blocked Users
476
Top Blocked Users Drill-Down
479
Top Blocked Hosts
480
Top Blocked Hosts Drill-Down
483
Blocked Web Categories
484
Blocked Web Categories Drill-Down
487
Application Access Control
488
Top Applications Blocked
488
Top Users Blocked
491
Top Applications Allowed
494
Scheduled Report Summary Screen
509
Customize Daily Report Screen
510
Customize Weekly Report Screen
518
Customize Overtime Report Screen
520
Configure Template List
522
Logo Template
523
Template Add/Edit
523
Logo Template Add/Edit
524
Logs
527
Chapter 11 Event
499
Event
499
Successful Logins
499
Failed Logins
501
Top Sessions Per Host
502
Top Sessions Per User
505
Chapter 12 Schedule Report
509
Schedule Report
509
Chapter 13 Logs
527
Log Viewer
527
By Day (Summary)
531
Log Receiver
531
By Device
533
Log Receiver > by Device > by Category Screen
535
VRPT System Logs
536
File Archiving Settings
538
Log Archiving
538
View Archived Files
541
Log Transfer
543
Log Remove
544
System Setting, User Management and Troubleshooting
547
Part III: System Setting, User Management and Troubleshooting
547
Chapter 14 System Setting
549
General Configuration Screen
549
Configuring for Hostname Reverse
551
Server Configuration Screen
554
Data Backup and Data Restore Screen
555
Data Maintenance Screens
555
Device List Screen
556
Upgrade Screen
557
Registration Screens
558
Registration Summary Screen
559
Registration > Upgrade Screen
560
Notification
561
Add/Edit a Notification
563
Rule-Based Alert
565
Add/Edit a Rule-Based Alert
566
Chapter 15 User Management
577
Group Screen
577
User Management
577
Group > Add/Edit Group Screen
578
Account Screen
579
Account > Add/Edit User Account Screen
580
Troubleshooting
583
Chapter 16 Troubleshooting
583
Appendices and Index
587
Part IV: Appendices and Index
587
Appendix A Product Specifications
589
Appendix B Zywall USG Series and Zywall 1050 Log Descriptions
599
Appendix C Zynos Log Descriptions
645
Appendix D Open Software Announcements
671
Appendix E Legal Information
709
Index
711
Advertisement
ZyXEL Communications VANTAGE REPORT 2.3 - User Manual (282 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 5.77 MB
Table of Contents
Copyright
3
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
7
Preface
21
Chapter 1 Introducing Vantage Report
23
Introduction
23
Key Features
23
Figure 1 Typical Vantage Report Application
23
Versions
24
Table 1 Differences between Standard Version and Professional Version
25
Chapter 2 The Vantage Report Server
27
Starting and Stopping the Vantage Report Server
27
E-Mail in the Vantage Report Server
27
Time in the Vantage Report Server
28
Table 2 Processing Times by Menu Item
28
Zyxel Device Configuration and Source Data
29
Table 3 Configuration Requirements for Zyxel Devices by Menu Item
29
Chapter 3 The Web Configurator
31
Web Configurator Requirements
31
Web Configurator Access
31
Figure 2 Web Configurator Login Screen
32
Figure 3 Web Configurator Main Screen
32
Title Bar
33
Device Window
33
Table 4 Title Bar
33
Figure 4 Device Window
34
Table 5 Device Window
34
Figure 5 Add Device, Edit Device, and Device Information Screens
35
Function Window
36
Figure 6 Device Window Right-Click Menu
36
Figure 7 Function Window
36
Table 6 Function Window
37
Figure 8 Function Window Right-Click Menu
40
Report Window
41
Monitor Layout
41
Figure 9 Report Window: Monitor and Statistical Report Examples
41
Figure 10 Typical Monitor Layout
42
Table 7 Typical Monitor Features
42
Statistical Report Layout
43
Figure 11 Report Window Right-Click Menu
43
Figure 12 Typical Statistical Report Layout
43
Table 8 Typical Statistical Report Features
43
Figure 13 Report Window Right-Click Menu
44
Chapter 4 Monitor
45
Bandwidth Monitor
45
Figure 14 Monitor > Bandwidth
45
Table 9 Monitor > Bandwidth
45
Service Monitor
46
Figure 15 Monitor > Service
46
Attack Monitor
47
Table 10 Monitor > Service
47
Intrusion Monitor
48
Figure 16 Monitor > Attack
48
Table 11 Monitor > Attack
48
Anti-Virus Monitor
49
Figure 17 Monitor > Intrusion
49
Table 12 Monitor > Intrusion
49
Anti-Spam Monitor
50
Figure 18 Monitor > Antivirus
50
Table 13 Monitor > Antivirus
50
Figure 19 Monitor > Antispam
51
Table 14 Monitor > Antispam
51
Chapter 5 Traffic
53
Bandwidth
53
Bandwidth Summary
53
Figure 20 Traffic > Bandwidth > Summary
54
Table 15 Traffic > Bandwidth > Summary
54
Bandwidth Summary Drill-Down
55
Figure 21 Traffic > Bandwidth > Summary > Drill-Down
56
Table 16 Traffic > Bandwidth > Summary > Drill-Down
56
Bandwidth Top Protocols
57
Figure 22 Traffic > Bandwidth > Top Protocol
58
Table 17 Traffic > Bandwidth > Top Protocol
58
Bandwidth Top Protocols Drill-Down
59
Figure 23 Traffic > Bandwidth > Top Protocol > Drill-Down
60
Table 18 Traffic > Bandwidth > Top Protocol > Drill-Down
60
Top Bandwidth Hosts
61
Figure 24 Traffic > Bandwidth > Top Hosts
61
Table 19 Traffic > Bandwidth > Top Hosts
62
Top Bandwidth Hosts Drill-Down
63
Figure 25 Traffic > Bandwidth > Top Hosts > Drill-Down
63
Web Traffic
64
Top Web Sites
64
Table 20 Traffic > Bandwidth > Top Hosts > Drill-Down
64
Figure 26 Traffic > WEB > Top Sites
65
Table 21 Traffic > WEB > Top Sites
65
Top Web Sites Drill-Down
66
Figure 27 Traffic > WEB > Top Sites > Drill-Down
67
Table 22 Traffic > WEB > Top Sites > Drill-Down
67
Top Web Hosts
68
Figure 28 Traffic > WEB > Top Hosts
68
Top Web Hosts Drill-Down
69
Table 23 Traffic > WEB > Top Hosts
69
Figure 29 Traffic > WEB > Top Hosts > Drill-Down
70
Table 24 Traffic > WEB > Top Hosts > Drill-Down
70
FTP Traffic
71
Top FTP Sites
71
Figure 30 Traffic > FTP > Top Sites
72
Table 25 Traffic > FTP > Top Sites
72
Top FTP Sites Drill-Down
73
Figure 31 Traffic > FTP > Top Sites > Drill-Down
74
Table 26 Traffic > FTP > Top Sites > Drill-Down
74
Top FTP Hosts
75
Figure 32 Traffic > FTP > Top Hosts
75
Top FTP Hosts Drill-Down
76
Table 27 Traffic > FTP > Top Hosts
76
Figure 33 Traffic > FTP > Top Hosts > Drill-Down
77
Table 28 Traffic > FTP > Top Hosts > Drill-Down
77
Mail Traffic
78
Top Mail Sites
78
Figure 34 Traffic > MAIL > Top Sites
79
Table 29 Traffic > MAIL > Top Sites
79
Top Mail Sites Drill-Down
80
Figure 35 Traffic > MAIL > Top Sites > Drill-Down
81
Table 30 Traffic > MAIL > Top Sites > Drill-Down
81
Top Mail Hosts
82
Figure 36 Traffic > MAIL > Top Hosts
82
Top Mail Hosts Drill-Down
83
Table 31 Traffic > MAIL > Top Hosts
83
Figure 37 Traffic > MAIL > Top Hosts > Drill-Down
84
Table 32 Traffic > MAIL > Top Hosts > Drill-Down
84
VPN Traffic
85
Top VPN Peer Gateways
85
Figure 38 Traffic > VPN > Top Peer Gateways
86
Table 33 Traffic > VPN > Top Peer Gateways
86
Top VPN Peer Gateways Drill-Down
87
Figure 39 Traffic > VPN > Top Peer Gateways > Drill-Down
88
Table 34 Traffic > VPN > Top Peer Gateways > Drill-Down
88
Top VPN Hosts
89
Figure 40 Traffic > VPN > Top Hosts
90
Table 35 Traffic > VPN > Top Hosts
90
Top VPN Hosts Drill-Down
91
Figure 41 Traffic > VPN > Top Hosts > Drill-Down
92
Table 36 Traffic > VPN > Top Hosts > Drill-Down
92
Other Traffic
93
Service Settings
93
Figure 42 Service > Customization > Customization
93
Top Destinations of Other Traffic
94
Table 37 Service > Customization > Customization
94
Figure 43 Traffic > Customization > Top Destinations
95
Table 38 Traffic > Customization > Top Destinations
95
Top Destinations of Other Traffic Drill-Down
96
Figure 44 Traffic > Customization > Top Destinations > Drill-Down
97
Table 39 Traffic > Customization > Top Destinations > Drill-Down
97
Top Sources of Other Traffic
98
Figure 45 Traffic > Customization > Top Sources
98
Table 40 Traffic > Customization > Top Sources
99
Top Sources of Other Traffic Drill-Down
100
Figure 46 Traffic > Customization > Top Sources > Drill-Down
100
Table 41 Traffic > Customization > Top Sources > Drill-Down
100
Chapter 6 Network Attack
103
Attack
103
Attack Summary
103
Figure 47 Network Attack > Attack > Summary
104
Table 42 Network Attack > Attack > Summary
104
Attack Summary Drill-Down
105
Figure 48 Network Attack > Attack > Summary > Drill-Down
106
Table 43 Network Attack > Attack > Summary > Drill-Down
106
Top Attack Sources
107
Figure 49 Network Attack > Attack > Top Sources
107
Top Attack Sources Drill-Down
108
Table 44 Network Attack > Attack > Top Sources
108
Figure 50 Network Attack > Attack > Top Sources > Drill-Down
109
Table 45 Network Attack > Attack > Top Sources > Drill-Down
109
Top Attack Categories
110
Figure 51 Network Attack > Attack > by Category
111
Table 46 Network Attack > Attack > by Category
111
Top Attack Categories Drill-Down
112
Figure 52 Network Attack > Attack > by Category > Drill-Down
113
Table 47 Network Attack > Attack > by Category > Drill-Down
113
Intrusion
114
Intrusion Summary
114
Figure 53 Network Attack > Intrusion > Summary
115
Table 48 Network Attack > Intrusion > Summary
115
Intrusion Summary Drill-Down
116
Figure 54 Network Attack > Intrusion > Summary > Drill-Down
117
Table 49 Network Attack > Intrusion > Summary > Drill-Down
117
Top Intrusion Signatures
118
Figure 55 Network Attack > Intrusion > Top Intrusions
119
Table 50 Network Attack > Intrusion > Top Intrusions
119
Top Intrusion Signatures Drill-Down
120
Figure 56 Network Attack > Intrusion > Top Intrusions > Drill-Down
121
Table 51 Network Attack > Intrusion > Top Intrusions > Drill-Down
121
Top Intrusion Sources
122
Figure 57 Network Attack > Intrusion > Top Sources
123
Table 52 Network Attack > Intrusion > Top Sources
123
Top Intrusion Sources Drill-Down
124
Figure 58 Network Attack > Intrusion > Top Sources > Drill-Down
125
Table 53 Network Attack > Intrusion > Top Sources > Drill-Down
125
Top Intrusion Destinations
126
Figure 59 Intrusion > Top Destinations
127
Table 54 Intrusion > Top Destinations
127
Top Intrusion Destinations Drill-Down
128
Figure 60 Network Attack > Intrusion > Top Destinations > Drill-Down
129
Table 55 Network Attack > Intrusion > Top Destinations > Drill-Down
129
Intrusion Severities
130
Figure 61 Network Attack > Intrusion > by Severity
131
Table 56 Network Attack > Intrusion > by Severity
131
Intrusion Severities Drill-Down
132
Figure 62 Network Attack > Intrusion > by Severity > Drill-Down
133
Table 57 Network Attack > Intrusion > by Severity > Drill-Down
133
Antivirus
134
Virus Summary
134
Figure 63 Network Attack > Antivirus > Summary
135
Table 58 Network Attack > Antivirus > Summary
135
Virus Summary Drill-Down
136
Figure 64 Network Attack > Antivirus > Summary > Drill-Down
137
Table 59 Network Attack > Antivirus > Summary > Drill-Down
137
Top Viruses
138
Figure 65 Network Attack > Antivirus > Top Viruses
139
Table 60 Network Attack > Antivirus > Top Viruses
139
Top Viruses Drill-Down
140
Figure 66 Network Attack > Antivirus > Top Viruses > Drill-Down
141
Table 61 Network Attack > Antivirus > Top Viruses > Drill-Down
141
Top Virus Sources
142
Figure 67 Network Attack > Antivirus > Top Sources
143
Table 62 Network Attack > Antivirus > Top Sources
143
Top Virus Sources Drill-Down
144
Figure 68 Network Attack > Antivirus > Top Sources > Drill-Down
145
Table 63 Network Attack > Antivirus > Top Sources > Drill-Down
145
Top Virus Destinations
146
Figure 69 Network Attack > Antivirus > Top Destinations
147
Table 64 Network Attack > Antivirus > Top Destinations
147
Antispam
148
Spam Summary
148
Figure 70 Network Attack > Antispam > Summary
149
Table 65 Network Attack > Antispam > Summary
149
Spam Summary Drill-Down
150
Figure 71 Network Attack > Antispam > Summary > Drill-Down
151
Table 66 Network Attack > Antispam > Summary > Drill-Down
151
Top Spam Senders
152
Figure 72 Network Attack > Antispam > Top Senders
153
Table 67 Network Attack > Antispam > Top Senders
153
Top Spam Sources
154
Figure 73 Network Attack > Antispam > Top Sources
155
Table 68 Network Attack > Antispam > Top Sources
155
Top Spam Scores
156
Figure 74 Network Attack > Antispam > by Score
157
Table 69 Network Attack > Antispam > by Score
157
Chapter 7 Security Policy
159
Blocked Web Accesses
159
Web Block Summary
159
Figure 75 Security Policy > WEB Blocked > Summary
160
Table 70 Security Policy > WEB Blocked > Summary
160
Web Block Summary Drill-Down
161
Figure 76 Security Policy > WEB Blocked > Summary > Drill-Down
162
Table 71 Security Policy > WEB Blocked > Summary > Drill-Down
162
Top Blocked Web Sites
163
Figure 77 Security Policy > WEB Blocked > Top Sites
163
Top Blocked Web Sites Drill-Down
164
Table 72 Security Policy > WEB Blocked > Top Sites
164
Figure 78 Security Policy > WEB Blocked > Top Sites > Drill-Down
165
Table 73 Security Policy > WEB Blocked > Top Sites > Drill-Down
165
Top Blocked Web Hosts
166
Figure 79 Security Policy > WEB Blocked > Top Hosts
167
Table 74 Security Policy > WEB Blocked > Top Hosts
167
Top Blocked Web Hosts Drill-Down
168
Figure 80 Security Policy > WEB Blocked > Top Hosts > Drill-Down
169
Table 75 Security Policy > WEB Blocked > Top Hosts > Drill-Down
169
Top Blocked Web Categories
170
Figure 81 Security Policy > WEB Blocked > by Category
170
Top Blocked Web Categories Drill-Down
171
Table 76 Security Policy > WEB Blocked > by Category
171
Figure 82 Security Policy > WEB Blocked > by Category > Drill-Down
172
Table 77 Security Policy > WEB Blocked > by Category > Drill-Down
172
Allowed Web Accesses
173
Web Allowed Summary
173
Figure 83 Security Policy > WEB Allowed > Summary
174
Table 78 Security Policy > WEB Allowed > Summary
174
Web Allowed Summary Drill-Down
175
Figure 84 Security Policy > WEB Allowed > Summary > Drill-Down
176
Table 79 Security Policy > WEB Allowed > Summary > Drill-Down
176
Top Allowed Web Sites
177
Figure 85 Security Policy > WEB Allowed > Top Sites
177
Top Allowed Web Sites Drill-Down
178
Table 80 Security Policy > WEB Allowed > Top Sites
178
Figure 86 Security Policy > WEB Allowed > Top Sites > Drill-Down
179
Table 81 Security Policy > WEB Allowed > Top Sites > Drill-Down
179
Top Allowed Web Hosts
180
Figure 87 Security Policy > WEB Allowed > Top Hosts
181
Table 82 Security Policy > WEB Allowed > Top Hosts
181
Top Allowed Web Hosts Drill-Down
182
Figure 88 Security Policy > WEB Allowed > Top Hosts > Drill-Down
183
Table 83 Security Policy > WEB Allowed > Top Hosts > Drill-Down
183
Chapter 8 Authentication
185
Successful Login Screen
185
Figure 89 Event > Device Login > Successful Login
185
Table 84 Event > Device Login > Successful Login
185
Failed Login Screen
186
Figure 90 Event > Device Login > Failed Login
186
Table 85 Event > Device Login > Failed Login
187
Chapter 9 Log Viewer
189
Regular Log Viewer
189
Figure 91 Log Viewer > All Logs
190
Table 86 Log Viewer > All Logs
190
Critical Log Viewer
191
Figure 92 Log Viewer > Critical Logs
192
Table 87 Log Viewer > Critical Logs
193
Chapter 10 Schedule Report
195
Scheduled Report Summary Screen
195
Figure 93 Schedule Reports > Schedule Reports
195
Customize Daily Report Screen
196
Table 88 Schedule Reports > Schedule Reports
196
Figure 94 Schedule Reports > Schedule Reports > Add (Daily Report)
197
Customize Weekly Report Screen
198
Table 89 Schedule Reports > Schedule Reports > Add (Daily Report)
198
Figure 95 Schedule Reports > Schedule Reports > Add (Weekly Report)
199
Customize Overtime Report Screen
200
Table 90 Schedule Reports > Schedule Reports > Add (Weekly Report)
200
Figure 96 Schedule Reports > Schedule Reports > Add (Overtime Report)
201
Table 91 Schedule Reports > Schedule Reports > Add (Overtime Report)
202
Chapter 11 System
203
General Configuration Screen
203
Server Configuration Screen
204
Figure 97 System > General Configuration
204
Table 92 System > General Configuration
204
User Maintenance Screens
205
Figure 98 System > Server Configuration
205
Table 93 System > Server Configuration
205
Add/Edit User Account Screen
206
Figure 99 System > User Maintenance
206
Table 94 System > User Maintenance
206
User Maintenance Summary Screen
206
Data Maintenance Screens
207
Figure 100 Add/Edit User Account Screen
207
Table 95 Add/Edit User Account Screen
207
Data Backup and Data Restore Screen
208
Device List Export and Device List Import Screen
208
Figure 101 System > Data Maintenance > Configuration Backup & Restore
208
Table 96 System > Data Maintenance > Configuration Backup & Restore
208
Upgrade Screen
209
Figure 102 System > Data Maintenance > Device List Import & Export
209
Table 97 System > Data Maintenance > Device List Import & Export
209
Registration Screens
210
Registration Summary Screen
210
Figure 103 System > Upgrade
210
Table 98 System > Upgrade
210
Figure 104 System > Registration
211
Table 99 System > Registration
211
Registration Screen
212
Figure 105 Registration Screen
212
Table 100 Registration Screen
212
About Screen
213
Figure 106 System > about
213
Appendix A
215
Troubleshooting
215
Product Specifications
217
Table 101 Web Configurator Specifications
217
Table 102 System Notifications Specifications
217
Table 103 Feature Specifications
217
Appendix C Setting up Your Computer's IP Address
219
Windows 2000/NT/XP
219
Figure 107 Windows XP: Start Menu
220
Figure 108 Windows XP: Control Panel
220
Figure 109 Windows XP: Control Panel: Network Connections: Properties
221
Figure 110 Windows XP: Local Area Connection Properties
221
Figure 111 Windows XP: Advanced TCP/IP Settings
222
Verifying Settings
223
Figure 112 Windows XP: Internet Protocol (TCP/IP) Properties
223
Appendix D Log Descriptions
225
Table 104 System Maintenance Logs
225
Table 105 System Error Logs
226
Table 106 Access Control Logs
226
Table 107 TCP Reset Logs
227
Table 108 Packet Filter Logs
227
Table 109 ICMP Logs
227
Table 110 CDR Logs
228
Table 111 PPP Logs
228
Table 112 Upnp Logs
229
Table 113 Content Filtering Logs
229
Table 114 Attack Logs
230
Table 115 Ipsec Logs
231
Table 116 IKE Logs
231
Table 117 PKI Logs
234
Table 118 Certificate Path Verification Failure Reason Codes
235
Table 119 802.1X Logs
236
Table 120 ACL Setting Notes
237
Table 121 ICMP Notes
237
Table 122 Syslog Logs
238
Appendix E Open Software Announcements
241
Notice
241
Index
277
ZyXEL Communications VANTAGE REPORT 2.3 - Quick Start Manual (119 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 1.79 MB
Table of Contents
Table of Contents
1
English
2
Deutsch
18
Español
34
Français
52
Italiano
70
繁體中文
88
Русский
104
Advertisement
ZyXEL Communications VANTAGE REPORT 2.3 - Datasheet (2 pages)
Logging and Reporting Analyzer for ZyWALL Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Measuring Instruments
| Size: 0.16 MB
Advertisement
Related Products
ZyXEL Communications Prestige 2304R-P1
ZyXEL Communications Prestige 2302R Series
ZyXEL Communications PRESTIGE 2302RL -
ZyXEL Communications 2864 Series
ZyXEL Communications Prestige 2000W
ZyXEL Communications Prestige 28641
ZyXEL Communications ZYWALL 20W -
ZyXEL Communications Prestige 2602H-6xC
ZyXEL Communications Prestige 202H Series
ZyXEL Communications Prestige 2602HL Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL