Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Software
VANTAGE REPORT -
ZyXEL Communications VANTAGE REPORT - Manuals
Manuals and User Guides for ZyXEL Communications VANTAGE REPORT -. We have
9
ZyXEL Communications VANTAGE REPORT - manuals available for free PDF download: User Manual, Manual, Quick Start Manual, Support Notes, Datasheet
ZyXEL Communications VANTAGE REPORT - User Manual (458 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 10 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Table of Contents
7
Contents Overview
7
Table of Contents
9
List of Figures
17
List of Tables
23
Introduction
29
PART I Introduction
29
Chapter 1 Introducing Vantage Report
31
Introduction
31
Versions
31
Figure 1 Typical Vantage Report Application
31
Table 1 Differences between Basic Version and Full Version
32
Chapter 2 The Vantage Report Server
33
Starting and Stopping the Vantage Report Server
33
E-Mail in the Vantage Report Server
34
Table 2 Processing Times by Menu Item
34
Time in the Vantage Report Server
34
Zyxel Device Configuration and Source Data
35
Table 3 Zynos-Based Zyxel Device Configuration Requirements by Menu Item
35
Table 4 Zywall 1050 Configuration Requirements by Menu Item
36
Chapter 3 The Web Configurator
37
Web Configurator Access
37
Web Configurator Requirements
37
Figure 2 Web Configurator Login Screen
38
Figure 3 Web Configurator Main Screen
39
Device Window
40
Table 5 Title Bar
40
Title Bar
40
Figure 4 Device Window
41
Table 6 Device Window
41
Figure 5 Add/Edit Device and Add/Edit Folder Screens
42
Figure 6 Device Window Right-Click Menu
43
Function Window
43
Table 7 Add/Edit Device and Add/Edit Folder Screen Fields
43
Figure 7 Function Window
44
Table 8 Function Window
44
Table 9 Function Differences for Basic and Full Versions
51
Device Information Screen
52
Figure 8 Function Window Right-Click Menu
52
Figure 9 Device Information Screen
52
Table 10 Device Information Screen Fields
52
Figure 10 Report Window: Monitor and Statistical Report Examples
53
Figure 11 Typical Monitor Layout
53
Figure 12 Report Window Right-Click Menu
54
Table 11 Typical Monitor Features
54
Figure 13 Typical Statistical Report Layout
55
Table 12 Typical Statistical Report Features
55
Figure 14 Report Window Right-Click Menu
56
Dashboard
57
Figure 15 View Logs
57
Table 13 View Logs
57
Figure 16 Dashboard Initial View
58
Figure 17 Dashboard Configure
58
Dashboard
59
Monitors and Statistical Reports
52
Report Window
52
View Logs
56
Figure 18 Dashboard Select Device and Monitor or Summary
59
Figure 19 Dashboard Configured
60
Table 14 Dashboard
61
Monitor and Traffic
63
Part II: Monitor and Traffic
63
Bandwidth Monitor
65
Table 16 Monitor > Service
67
Attack Monitor
68
Intrusion Monitor
68
Monitor
65
Table 15 Monitor > Bandwidth
65
Service Monitor
66
Figure 24 Monitor > Antivirus
70
Table 19 Monitor > Antivirus
70
Figure 25 Monitor > Antispam
71
Table 20 Monitor > Antispam
71
Bandwidth
73
Bandwidth Summary
73
Table 22 Traffic > Bandwidth > Summary > Drill-Down
76
Bandwidth Top Protocols
77
Figure 29 Traffic > Bandwidth > Top Protocol > Drill-Down
80
Table 24 Traffic > Bandwidth > Top Protocol > Drill-Down
80
Top Bandwidth Hosts
81
Figure 30 Traffic > Bandwidth > Top Hosts
82
Table 25 Traffic > Bandwidth > Top Hosts
82
Figure 31 Traffic > Bandwidth > Top Hosts > Drill-Down
84
Top Bandwidth Hosts Drill-Down
84
Top Bandwidth Users
85
Figure 34 Traffic > Bandwidth > Top Destinations
90
Table 29 Traffic > Bandwidth > Top Destinations
90
Figure 35 Traffic > Bandwidth > Top Destinations > Drill-Down
92
Top Bandwidth Destinations Drill-Down
92
Top Web Sites
93
Web Traffic
93
Table 31 Traffic > WEB > Top Sites
94
Top Web Sites Drill-Down
96
Table 37 Traffic > FTP > Top Sites
105
Top FTP Sites Drill-Down
107
Table 50 Traffic > Customization > Top Destinations
128
Top Destinations of Other Traffic Drill-Down
129
Table 52 Traffic > Customization > Top Sources
131
Top Sources of Other Traffic Drill-Down
133
Table 54 Traffic > Customization > Top Users
135
Top Users of Other Traffic Drill-Down
136
Vpn
139
Figure 66 VPN > Site-To-Site > Top Sites
145
Table 60 VPN > Site-To-Site > Top Sites
146
Figure 67 VPN > Site-To-Site > Top Sites > Drill-Down
147
Top VPN Sites Drill-Down
147
Top VPN Tunnels
148
Table 62 VPN > Site-To-Site > Top Tunnels
149
Top VPN Tunnels Drill-Down
151
Top VPN Destinations Drill-Down
167
Table 74 VPN > Remote Access > Top Protocols
171
Table 75 VPN > Remote Access > Top Protocols > Drill-Down
173
Top VPN Protocols Drill-Down
173
Top VPN Destinations
174
Table 76 VPN > Remote Access > Top Destinations
175
Top VPN Destinations Drill-Down
177
Traffic
73
Chapter 4 Monitor
65
Figure 20 Monitor > Bandwidth
65
Figure 21 Monitor > Service
67
Figure 22 Monitor > Attack
68
Table 17 Monitor > Attack
68
Anti-Virus Monitor
69
Figure 23 Monitor > Intrusion
69
Table 18 Monitor > Intrusion
69
Anti-Spam Monitor
70
Figure 85 VPN > Xauth> Failed Login
180
Table 79 VPN > Xauth> Failed Login
180
Network Attack and Security Policy
183
Part III: Network Attack and Security Policy
183
Attack
185
Attack Summary
185
Chapter 5 Traffic
73
Figure 26 Traffic > Bandwidth > Summary
73
Table 21 Traffic > Bandwidth > Summary
74
Bandwidth Summary Drill-Down
75
Figure 27 Traffic > Bandwidth > Summary > Drill-Down
76
Figure 28 Traffic > Bandwidth > Top Protocols
77
Table 23 Traffic > Bandwidth > Top Protocols
78
Bandwidth Top Protocols Drill-Down
79
Table 26 Traffic > Bandwidth > Top Hosts > Drill-Down
85
Figure 32 Traffic > Bandwidth > Top Users
86
Table 27 Traffic > Bandwidth > Top Users
86
Figure 33 Traffic > Bandwidth > Top Users > Drill-Down
88
Table 28 Traffic > Bandwidth > Top Users > Drill-Down
88
Top Bandwidth Users Drill-Down
88
Top Bandwidth Destinations
89
Table 30 Traffic > Bandwidth > Top Destinations > Drill-Down
93
Figure 36 Traffic > WEB > Top Sites
94
Figure 37 Traffic > WEB > Top Sites > Drill-Down
96
Table 32 Traffic > WEB > Top Sites > Drill-Down
96
Top Web Hosts
97
Figure 38 Traffic > WEB > Top Hosts
98
Figure 39 Traffic > WEB > Top Hosts > Drill-Down
100
Figure 40 Traffic > WEB > Top Users
101
Table 35 Traffic > WEB > Top Users
102
Figure 41 Traffic > WEB > Top Users > Drill-Down
103
FTP Traffic
104
Table 36 Traffic > WEB > Top Users > Drill-Down
104
Top FTP Sites
104
Figure 42 Traffic > FTP > Top Sites
105
Figure 43 Traffic > FTP > Top Sites > Drill-Down
107
Table 38 Traffic > FTP > Top Sites > Drill-Down
107
Figure 44 Traffic > FTP > Top Hosts
108
Top FTP Hosts
108
Table 39 Traffic > FTP > Top Hosts
109
Figure 45 Traffic > FTP > Top Hosts > Drill-Down
110
Top FTP Hosts Drill-Down
110
Table 40 Traffic > FTP > Top Hosts > Drill-Down
111
Top FTP Users
111
Figure 46 Traffic > FTP > Top Users
112
Figure 47 Traffic > FTP > Top Users > Drill-Down
114
Table 42 Traffic > FTP > Top Hosts > Drill-Down
114
Mail Traffic
115
Top Mail Sites
115
Figure 48 Traffic > MAIL > Top Sites
116
Table 43 Traffic > MAIL > Top Sites
116
Figure 49 Traffic > MAIL > Top Sites > Drill-Down
118
Table 44 Traffic > MAIL > Top Sites > Drill-Down
118
Top Mail Sites Drill-Down
118
Figure 50 Traffic > MAIL > Top Hosts
119
Top Mail Hosts
119
Table 45 Traffic > MAIL > Top Hosts
120
Figure 51 Traffic > MAIL > Top Hosts > Drill-Down
121
Top Mail Hosts Drill-Down
121
Table 46 Traffic > MAIL > Top Hosts > Drill-Down
122
Top Mail Users
122
Figure 52 Traffic > MAIL > Top Users
123
Table 47 Traffic > MAIL > Top Users
123
Top Mail Users Drill-Down
124
Figure 53 Traffic > MAIL > Top Users > Drill-Down
125
Table 48 Traffic > MAIL > Top Users > Drill-Down
125
Figure 54 Traffic > Customization > Customization (Platform Selection)
126
Other Traffic
126
Platform Selection
126
Service Settings
126
Figure 55 Traffic > Customization > Customization (Service Settings)
127
Table 49 Service > Customization > Customization (Service Settings)
127
Top Destinations of Other Traffic
127
Figure 56 Traffic > Customization > Top Destinations
128
Figure 57 Traffic > Customization > Top Destinations > Drill-Down
130
Top Sources of Other Traffic
131
Table 53 Traffic > Customization > Top Sources > Drill-Down
133
Top Other Traffic Users
134
VPN Link Status
139
VPN Site-To-Site
139
Figure 63 VPN > Site-To-Site > Traffic Monitor
140
Table 56 VPN > Site-To-Site > Link Status
140
Table 57 VPN > Site-To-Site > Traffic Monitor
141
Figure 64 VPN > Site-To-Site > Top Peer Gateways
142
Figure 65 VPN > Site-To-Site > Top Peer Gateways > Drill-Down
144
Table 59 VPN > Site-To-Site > Top Peer Gateways > Drill-Down
144
Top VPN Sites
145
Table 61 VPN > Site-To-Site > Top Sites > Drill-Down
148
Figure 68 VPN > Site-To-Site > Top Tunnels
149
Figure 69 VPN > Site-To-Site > Top Tunnels > Drill-Down
151
Table 63 VPN > Site-To-Site > Top Tunnels > Drill-Down
151
Figure 70 VPN > Site-To-Site > Top Protocols
152
Top VPN Protocols
152
Figure 71 VPN > Site-To-Site > Top Protocols > Drill-Down
155
Figure 72 VPN > Site-To-Site > Top Hosts
156
Table 66 VPN > Site-To-Site > Top Hosts
157
Figure 73 VPN > Site-To-Site > Top Hosts > Drill-Down
159
Table 67 VPN > Site-To-Site > Top Hosts > Drill-Down
159
Top VPN Hosts Drill-Down
159
Top VPN Users
160
Figure 74 VPN > Site-To-Site > Top Users
161
Table 68 VPN > Site-To-Site > Top Users
161
Figure 75 VPN > Site-To-Site > Top Users > Drill-Down
163
Top VPN Users Drill-Down
163
Table 69 VPN > Site-To-Site > Top Users > Drill-Down
164
Top VPN Destinations
164
Figure 76 VPN > Site-To-Site > Top Destinations
165
Table 70 VPN > Site-To-Site > Top Destinations
165
Figure 77 VPN > Site-To-Site > Top Destinations > Drill-Down
167
Table 71 VPN > Site-To-Site > Top Destinations > Drill-Down
168
VPN User Status
169
Top Web Users Drill-Down
103
Table 58 VPN > Site-To-Site > Top Peer Gateways
142
Top VPN Peer Gateways Drill-Down
143
Table 65 VPN > Site-To-Site > Top Protocols > Drill-Down
155
Top VPN Hosts
156
VPN Remote Access
168
VPN Total Users and Traffic
168
Figure 78 VPN > Remote Access > Total Users and Traffic
169
Table 72 VPN > Remote Access > Total Users and Traffic
169
Figure 79 VPN > Remote Access > User Status
170
Table 73 VPN > Remote Access > User Status
170
Top VPN Protocols
170
Figure 80 VPN > Remote Access > Top Protocols
171
Figure 81 VPN > Remote Access > Top Protocols > Drill-Down
173
Figure 82 VPN > Remote Access > Top Destinations
175
Figure 83 VPN > Remote Access > Top Destinations > Drill-Down
177
Figure 84 VPN > Xauth> Successful Login
179
Table 78 VPN > Xauth> Successful Login
179
VPN Failed Login
180
Table 34 Traffic > WEB > Top Hosts > Drill-Down
100
Top Web Users
101
Table 41 Traffic > FTP > Top Users
112
Top FTP Users Drill-Down
113
Table 51 Traffic > Customization > Top Destinations > Drill-Down
130
Figure 58 Traffic > Customization > Top Sources
131
Figure 59 Traffic > Customization > Top Sources > Drill-Down
133
Figure 60 Traffic > Customization > Top Users
134
Figure 61 Traffic > Customization > Top Users > Drill-Down
136
Table 55 Traffic > Customization > Top Users > Drill-Down
137
Chapter 6 VPN
139
Figure 62 VPN > Site-To-Site > Link Status
139
VPN Traffic Monitor
140
Table 33 Traffic > WEB > Top Hosts
98
Top Web Hosts Drill-Down
99
Top VPN Peer Gateways
141
Table 64 VPN > Site-To-Site > Top Protocols
153
Top VPN Protocols Drill-Down
154
Table 77 VPN > Remote Access > Top Destinations > Drill-Down
177
VPN Successful Login
178
Xauth
178
Advertisement
ZyXEL Communications VANTAGE REPORT - User Manual (716 pages)
User Guide
Brand:
ZyXEL Communications
| Category:
Software
| Size: 15 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Table of Contents
7
Contents Overview
7
Table of Contents
9
Introduction
19
PART I Introduction
19
Chapter 1 Introducing Vantage Report
21
Introduction
21
License Versions
22
Hardware Requirements
22
Chapter 2 The Vantage Report Server
23
Starting and Stopping the Vantage Report Server
23
E-Mail in the Vantage Report Server
24
Time in the Vantage Report Server
25
Common Terms
25
Common Icons
27
Zyxel Device Configuration and Source Data
27
Chapter 3 The Web Configurator
33
Web Configurator Requirements
33
Web Configurator Access
33
Main Menu Bar
37
The about Screen
37
Device Window
37
Menu Panel
41
Report and Setting Window
52
Device Information Screen
53
Monitors and Statistical Reports
54
View Logs
59
System Dashboard
59
Monitors, Reports and Logs
63
Part II: Monitors, Reports and Logs
63
Monitor
65
Monitor (Folder)
65
Customize the Column Fields
66
Dashboard
67
Dashboard
69
CPU Usage Monitor
71
Memory Usage Monitor
72
Session Usage Monitor
73
Port Usage Monitor
74
Interface Usage Monitor
75
Web Monitor
77
FTP Monitor
78
E-Mail Monitor
79
Site to Site (Ipsec) VPN Monitor
80
Client to Site (Ipsec) VPN Monitor
81
Client to Site (SSL) VPN Monitor
82
Firewall Access Control Monitor
83
Attack Monitor
84
Intrusion Hits
85
Anti-Virus Monitor
86
E-Mail Virus Found Monitor
87
Spam Monitor
88
E-Mail Intrusion Hits Monitor
89
Web Security - Security Threat Monitor
90
Web Security Virus Found Monitor
91
Web Security Intrusion Hits Monitor
92
Content Filter Monitor
93
Application Patrol Monitor
94
Network Traffic
95
Chapter 4 Monitor
65
Bandwidth
95
Bandwidth Summary
95
Chapter 5 Network Traffic
95
Bandwidth Summary Drill-Down
99
Bandwidth Top Protocols
100
Bandwidth Top Protocols Drill-Down
104
Top Bandwidth Hosts
106
Top Bandwidth Hosts Drill-Down
110
Top Bandwidth Users
112
Top Bandwidth Users Drill-Down
115
Top Bandwidth Destinations
117
Top Bandwidth Destinations Drill-Down
121
Top Web Sites
123
Web Traffic
123
Top Web Sites Drill-Down
126
Top Web Hosts
128
Top Web Hosts Drill-Down
131
Top Web Users
133
Top Web Users Drill-Down
136
FTP Traffic
138
Top FTP Sites
138
Top FTP Sites Drill-Down
141
Top FTP Hosts
143
Top FTP Hosts Drill-Down
146
Top FTP Users
148
Top FTP Users Drill-Down
151
Mail Traffic
153
Top Mail Sites
153
Top Mail Sites Drill-Down
156
Top Mail Hosts
158
Top Mail Hosts Drill-Down
161
Top Mail Users
163
Top Mail Users Drill-Down
166
Other Traffic
168
Platform Selection
169
Service Settings
169
Top Destinations of Other Traffic
170
Top Destinations of Other Traffic Drill-Down
173
Top Sources of Other Traffic
174
Top Sources of Other Traffic Drill-Down
177
Top Other Traffic Users
178
Top Users of Other Traffic Drill-Down
181
Chapter 6 Secure Remote Access
183
Secure Remote Access - Site-To-Site (Ipsec)
183
Secure Remote Access Link Status
183
Secure Remote Access Traffic Monitor
185
Top VPN Peer Gateways
186
Top VPN Peer Gateways Drill-Down
189
Top Secure Remote Access Sites
191
Top Secure Remote Access Sites Drill-Down
194
Top Secure Remote Access Tunnels
196
Top Secure Remote Access Tunnels Drill-Down
199
Top Secure Remote Access Protocols
201
Top Secure Remote Access Protocols Drill-Down
204
Top Secure Remote Access Hosts
206
Top Secure Remote Access Hosts Drill-Down
210
Top Secure Remote Access Users
212
Top Secure Remote Access Users Drill-Down
215
Top Secure Remote Access Destinations
217
Top Secure Remote Access Destinations Drill-Down
220
Secure Remote Access - Client-To-Site (Ipsec)
222
Secure Remote Access User Status
223
Secure Remote Access User Status Drill-Down
225
Top Secure Remote Access Protocols
227
Top Secure Remote Access Protocols Drill-Down
230
Top Secure Remote Access Destinations
232
Top Secure Remote Access Destinations Drill-Down
235
Secure Remote Access Top Users
237
Secure Remote Access Top Users Drill-Down
240
Secure Remote Access - Client-To-Site (SSL)
242
Secure Remote Access User Status
243
Secure Remote Access User Status Drill-Down
245
Top Secure Remote Access Protocols
246
Top Secure Remote Access Protocols Drill-Down
249
Top Secure Remote Access Destinations
251
Top Secure Remote Access Destinations Drill-Down
254
Top Secure Remote Access Applications
256
Top Secure Remote Access Applications Drill-Down
259
Secure Remote Access Top Users
261
Secure Remote Access Top Users Drill-Down
263
Secure Remote Access Successful Login
265
Xauth
265
Secure Remote Access Failed Login
267
Virus Found
333
Virus Found Summary
333
Virus Found Summary Drill-Down
336
Top Viruses
337
Top Viruses Drill-Down
340
Top Virus Sources
341
Top Virus Sources Drill-Down
344
Top Virus Destinations
346
Top Virus Destinations Drill-Down
348
Spam
349
Spam Summary
349
Spam Summary Drill-Down
352
Top Spam Senders
353
Top Spam Sources
356
Spam Scores
359
Intrusion Hits
361
Intrusion Hits Summary
361
Intrusion Hits Summary Drill-Down
363
Top Intrusion Hits Signatures
365
Top Intrusion Hits Signatures Drill-Down
367
Top Intrusion Hits Sources
368
Top Intrusion Hits Sources Drill-Down
371
Top Intrusion Hits Destinations
373
Top Intrusion Hits Destinations Drill-Down
376
Intrusion Hits Severities
378
Intrusion Hits Severities Drill-Down
380
Web Security
383
ZyXEL Communications VANTAGE REPORT - Manual (598 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 11 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Table of Contents
7
Contents Overview
7
Table of Contents
9
Introduction
17
PART I Introduction
17
Chapter 1 Introducing Vantage Report
19
Introduction
19
License Versions
20
Hardware Requirements
20
Chapter 2 The Vantage Report Server
23
Starting and Stopping the Vantage Report Server
23
E-Mail in the Vantage Report Server
24
Time in the Vantage Report Server
25
Zyxel Device Configuration and Source Data
25
Common Terms
28
Common Icons
29
Chapter 3 The Web Configurator
31
Web Configurator Requirements
31
Web Configurator Access
31
Main Menu Bar
34
The about Screen
34
Device Window
34
Menu Panel
38
Report and Setting Window
47
Device Information Screen
48
Monitors and Statistical Reports
49
View Logs
53
System Dashboard
54
Part II: Monitors, Reports and Logs
59
Monitor
61
Monitor (Folder)
61
Customize the Column Fields
62
Dashboard Configuration
63
Dashboard Configured
65
Bandwidth Monitor
66
CPU Usage Monitor
67
Memory Usage Monitor
68
Session Usage Monitor
69
Port Usage Monitor
70
Interface Usage Monitor
71
Service Monitor
73
Attack Monitor
74
Intrusion Monitor
75
Anti-Virus Monitor
76
Anti-Spam Monitor
77
Traffic
79
Monitors, Reports and Logs
59
Chapter 4 Monitor
61
Bandwidth
79
Bandwidth Summary
79
Attack Summary Drill-Down
252
Top Attacks
253
Top Attacks Drill-Down
256
Top Attack Sources
257
Top Attack Sources Drill-Down
260
Attack Types
262
Attack Types Drill-Down
264
Intrusion
265
Intrusion Summary
265
Intrusion Summary Drill-Down
268
Top Intrusion Signatures
270
Top Intrusion Signatures Drill-Down
273
Top Intrusion Sources
275
Top Intrusion Sources Drill-Down
278
Top Intrusion Destinations
280
Top Intrusion Destinations Drill-Down
283
Intrusion Severities
285
Intrusion Severities Drill-Down
288
Antivirus
289
Virus Summary
289
Virus Summary Drill-Down
292
Top Viruses
293
Top Viruses Drill-Down
296
Top Virus Sources
297
Top Virus Sources Drill-Down
300
Top Virus Destinations
302
Top Virus Destinations Drill-Down
304
Antispam
305
Spam Summary
305
Spam Summary Drill-Down
308
Top Spam Senders
309
Top Spam Sources
312
Spam Scores
315
Security Policy
317
Chapter 5 Traffic
79
Bandwidth Summary Drill-Down
83
Bandwidth Top Protocols
84
Bandwidth Top Protocols Drill-Down
88
Top Bandwidth Hosts
90
Top Bandwidth Hosts Drill-Down
94
Top Bandwidth Users
96
Top Bandwidth Users Drill-Down
99
Top Bandwidth Destinations
101
Top Bandwidth Destinations Drill-Down
105
Top Web Sites
107
Web Traffic
107
Top Web Sites Drill-Down
110
Top Web Hosts
112
Top Web Hosts Drill-Down
115
Top Web Users
117
Top Web Users Drill-Down
120
FTP Traffic
122
Top FTP Sites
122
Top FTP Sites Drill-Down
125
Top FTP Hosts
127
Top FTP Hosts Drill-Down
130
Top FTP Users
132
Top FTP Users Drill-Down
135
Mail Traffic
137
Top Mail Sites
137
Top Mail Sites Drill-Down
140
Top Mail Hosts
142
Top Mail Hosts Drill-Down
145
Top Mail Users
147
Top Mail Users Drill-Down
150
Other Traffic
152
Platform Selection
152
Service Settings
153
Top Destinations of Other Traffic
154
Top Destinations of Other Traffic Drill-Down
156
Top Sources of Other Traffic
158
Top Sources of Other Traffic Drill-Down
160
Top Other Traffic Users
162
Top Users of Other Traffic Drill-Down
164
Chapter 6 VPN
167
Attack
249
Attack Summary
249
Scheduled Report Summary Screen
383
Customize Daily Report Screen
384
Customize Weekly Report Screen
391
Customize Overtime Report Screen
393
Configure Template List
395
Logo Template
396
Template Add/Edit
396
Logo Template Add/Edit
397
Logs
401
Advertisement
ZyXEL Communications VANTAGE REPORT - User Manual (282 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 5 MB
Table of Contents
Copyright
3
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
7
Preface
21
Chapter 1 Introducing Vantage Report
23
Introduction
23
Key Features
23
Figure 1 Typical Vantage Report Application
23
Versions
24
Table 1 Differences between Standard Version and Professional Version
25
Chapter 2 The Vantage Report Server
27
Starting and Stopping the Vantage Report Server
27
E-Mail in the Vantage Report Server
27
Time in the Vantage Report Server
28
Table 2 Processing Times by Menu Item
28
Zyxel Device Configuration and Source Data
29
Table 3 Configuration Requirements for Zyxel Devices by Menu Item
29
Chapter 3 The Web Configurator
31
Web Configurator Requirements
31
Web Configurator Access
31
Figure 2 Web Configurator Login Screen
32
Figure 3 Web Configurator Main Screen
32
Title Bar
33
Device Window
33
Table 4 Title Bar
33
Figure 4 Device Window
34
Table 5 Device Window
34
Figure 5 Add Device, Edit Device, and Device Information Screens
35
Function Window
36
Figure 6 Device Window Right-Click Menu
36
Figure 7 Function Window
36
Table 6 Function Window
37
Figure 8 Function Window Right-Click Menu
40
Report Window
41
Monitor Layout
41
Figure 9 Report Window: Monitor and Statistical Report Examples
41
Figure 10 Typical Monitor Layout
42
Table 7 Typical Monitor Features
42
Statistical Report Layout
43
Figure 11 Report Window Right-Click Menu
43
Figure 12 Typical Statistical Report Layout
43
Table 8 Typical Statistical Report Features
43
Figure 13 Report Window Right-Click Menu
44
Chapter 4 Monitor
45
Bandwidth Monitor
45
Figure 14 Monitor > Bandwidth
45
Table 9 Monitor > Bandwidth
45
Service Monitor
46
Figure 15 Monitor > Service
46
Attack Monitor
47
Table 10 Monitor > Service
47
Intrusion Monitor
48
Figure 16 Monitor > Attack
48
Table 11 Monitor > Attack
48
Anti-Virus Monitor
49
Figure 17 Monitor > Intrusion
49
Table 12 Monitor > Intrusion
49
Anti-Spam Monitor
50
Figure 18 Monitor > Antivirus
50
Table 13 Monitor > Antivirus
50
Figure 19 Monitor > Antispam
51
Table 14 Monitor > Antispam
51
Chapter 5 Traffic
53
Bandwidth
53
Bandwidth Summary
53
Figure 20 Traffic > Bandwidth > Summary
54
Table 15 Traffic > Bandwidth > Summary
54
Bandwidth Summary Drill-Down
55
Figure 21 Traffic > Bandwidth > Summary > Drill-Down
56
Table 16 Traffic > Bandwidth > Summary > Drill-Down
56
Bandwidth Top Protocols
57
Figure 22 Traffic > Bandwidth > Top Protocol
58
Table 17 Traffic > Bandwidth > Top Protocol
58
Bandwidth Top Protocols Drill-Down
59
Figure 23 Traffic > Bandwidth > Top Protocol > Drill-Down
60
Table 18 Traffic > Bandwidth > Top Protocol > Drill-Down
60
Top Bandwidth Hosts
61
Figure 24 Traffic > Bandwidth > Top Hosts
61
Table 19 Traffic > Bandwidth > Top Hosts
62
Top Bandwidth Hosts Drill-Down
63
Figure 25 Traffic > Bandwidth > Top Hosts > Drill-Down
63
Web Traffic
64
Top Web Sites
64
Table 20 Traffic > Bandwidth > Top Hosts > Drill-Down
64
Figure 26 Traffic > WEB > Top Sites
65
Table 21 Traffic > WEB > Top Sites
65
Top Web Sites Drill-Down
66
Figure 27 Traffic > WEB > Top Sites > Drill-Down
67
Table 22 Traffic > WEB > Top Sites > Drill-Down
67
Top Web Hosts
68
Figure 28 Traffic > WEB > Top Hosts
68
Top Web Hosts Drill-Down
69
Table 23 Traffic > WEB > Top Hosts
69
Figure 29 Traffic > WEB > Top Hosts > Drill-Down
70
Table 24 Traffic > WEB > Top Hosts > Drill-Down
70
FTP Traffic
71
Top FTP Sites
71
Figure 30 Traffic > FTP > Top Sites
72
Table 25 Traffic > FTP > Top Sites
72
Top FTP Sites Drill-Down
73
Figure 31 Traffic > FTP > Top Sites > Drill-Down
74
Table 26 Traffic > FTP > Top Sites > Drill-Down
74
Top FTP Hosts
75
Figure 32 Traffic > FTP > Top Hosts
75
Top FTP Hosts Drill-Down
76
Table 27 Traffic > FTP > Top Hosts
76
Figure 33 Traffic > FTP > Top Hosts > Drill-Down
77
Table 28 Traffic > FTP > Top Hosts > Drill-Down
77
Mail Traffic
78
Top Mail Sites
78
Figure 34 Traffic > MAIL > Top Sites
79
Table 29 Traffic > MAIL > Top Sites
79
Top Mail Sites Drill-Down
80
Figure 35 Traffic > MAIL > Top Sites > Drill-Down
81
Table 30 Traffic > MAIL > Top Sites > Drill-Down
81
Top Mail Hosts
82
Figure 36 Traffic > MAIL > Top Hosts
82
Top Mail Hosts Drill-Down
83
Table 31 Traffic > MAIL > Top Hosts
83
Figure 37 Traffic > MAIL > Top Hosts > Drill-Down
84
Table 32 Traffic > MAIL > Top Hosts > Drill-Down
84
VPN Traffic
85
Top VPN Peer Gateways
85
Figure 38 Traffic > VPN > Top Peer Gateways
86
Table 33 Traffic > VPN > Top Peer Gateways
86
Top VPN Peer Gateways Drill-Down
87
Figure 39 Traffic > VPN > Top Peer Gateways > Drill-Down
88
Table 34 Traffic > VPN > Top Peer Gateways > Drill-Down
88
Top VPN Hosts
89
Figure 40 Traffic > VPN > Top Hosts
90
Table 35 Traffic > VPN > Top Hosts
90
Top VPN Hosts Drill-Down
91
Figure 41 Traffic > VPN > Top Hosts > Drill-Down
92
Table 36 Traffic > VPN > Top Hosts > Drill-Down
92
Other Traffic
93
Service Settings
93
Figure 42 Service > Customization > Customization
93
Top Destinations of Other Traffic
94
Table 37 Service > Customization > Customization
94
Figure 43 Traffic > Customization > Top Destinations
95
Table 38 Traffic > Customization > Top Destinations
95
Top Destinations of Other Traffic Drill-Down
96
Figure 44 Traffic > Customization > Top Destinations > Drill-Down
97
Table 39 Traffic > Customization > Top Destinations > Drill-Down
97
Top Sources of Other Traffic
98
Figure 45 Traffic > Customization > Top Sources
98
Table 40 Traffic > Customization > Top Sources
99
Top Sources of Other Traffic Drill-Down
100
Figure 46 Traffic > Customization > Top Sources > Drill-Down
100
Table 41 Traffic > Customization > Top Sources > Drill-Down
100
Chapter 6 Network Attack
103
Attack
103
Attack Summary
103
Figure 47 Network Attack > Attack > Summary
104
Table 42 Network Attack > Attack > Summary
104
Attack Summary Drill-Down
105
Figure 48 Network Attack > Attack > Summary > Drill-Down
106
Table 43 Network Attack > Attack > Summary > Drill-Down
106
Top Attack Sources
107
Figure 49 Network Attack > Attack > Top Sources
107
Top Attack Sources Drill-Down
108
Table 44 Network Attack > Attack > Top Sources
108
Figure 50 Network Attack > Attack > Top Sources > Drill-Down
109
Table 45 Network Attack > Attack > Top Sources > Drill-Down
109
Top Attack Categories
110
Figure 51 Network Attack > Attack > by Category
111
Table 46 Network Attack > Attack > by Category
111
Top Attack Categories Drill-Down
112
Figure 52 Network Attack > Attack > by Category > Drill-Down
113
Table 47 Network Attack > Attack > by Category > Drill-Down
113
Intrusion
114
Intrusion Summary
114
Figure 53 Network Attack > Intrusion > Summary
115
Table 48 Network Attack > Intrusion > Summary
115
Intrusion Summary Drill-Down
116
Figure 54 Network Attack > Intrusion > Summary > Drill-Down
117
Table 49 Network Attack > Intrusion > Summary > Drill-Down
117
Top Intrusion Signatures
118
Figure 55 Network Attack > Intrusion > Top Intrusions
119
Table 50 Network Attack > Intrusion > Top Intrusions
119
Top Intrusion Signatures Drill-Down
120
Figure 56 Network Attack > Intrusion > Top Intrusions > Drill-Down
121
Table 51 Network Attack > Intrusion > Top Intrusions > Drill-Down
121
Top Intrusion Sources
122
Figure 57 Network Attack > Intrusion > Top Sources
123
Table 52 Network Attack > Intrusion > Top Sources
123
Top Intrusion Sources Drill-Down
124
Figure 58 Network Attack > Intrusion > Top Sources > Drill-Down
125
Table 53 Network Attack > Intrusion > Top Sources > Drill-Down
125
Top Intrusion Destinations
126
Figure 59 Intrusion > Top Destinations
127
Table 54 Intrusion > Top Destinations
127
Top Intrusion Destinations Drill-Down
128
Figure 60 Network Attack > Intrusion > Top Destinations > Drill-Down
129
Table 55 Network Attack > Intrusion > Top Destinations > Drill-Down
129
Intrusion Severities
130
Figure 61 Network Attack > Intrusion > by Severity
131
Table 56 Network Attack > Intrusion > by Severity
131
Intrusion Severities Drill-Down
132
Figure 62 Network Attack > Intrusion > by Severity > Drill-Down
133
Table 57 Network Attack > Intrusion > by Severity > Drill-Down
133
Antivirus
134
Virus Summary
134
Figure 63 Network Attack > Antivirus > Summary
135
Table 58 Network Attack > Antivirus > Summary
135
Virus Summary Drill-Down
136
Figure 64 Network Attack > Antivirus > Summary > Drill-Down
137
Table 59 Network Attack > Antivirus > Summary > Drill-Down
137
Top Viruses
138
Figure 65 Network Attack > Antivirus > Top Viruses
139
Table 60 Network Attack > Antivirus > Top Viruses
139
Top Viruses Drill-Down
140
Figure 66 Network Attack > Antivirus > Top Viruses > Drill-Down
141
Table 61 Network Attack > Antivirus > Top Viruses > Drill-Down
141
Top Virus Sources
142
Figure 67 Network Attack > Antivirus > Top Sources
143
Table 62 Network Attack > Antivirus > Top Sources
143
Top Virus Sources Drill-Down
144
Figure 68 Network Attack > Antivirus > Top Sources > Drill-Down
145
Table 63 Network Attack > Antivirus > Top Sources > Drill-Down
145
Top Virus Destinations
146
Figure 69 Network Attack > Antivirus > Top Destinations
147
Table 64 Network Attack > Antivirus > Top Destinations
147
Antispam
148
Spam Summary
148
Figure 70 Network Attack > Antispam > Summary
149
Table 65 Network Attack > Antispam > Summary
149
Spam Summary Drill-Down
150
Figure 71 Network Attack > Antispam > Summary > Drill-Down
151
Table 66 Network Attack > Antispam > Summary > Drill-Down
151
Top Spam Senders
152
Figure 72 Network Attack > Antispam > Top Senders
153
Table 67 Network Attack > Antispam > Top Senders
153
Top Spam Sources
154
Figure 73 Network Attack > Antispam > Top Sources
155
Table 68 Network Attack > Antispam > Top Sources
155
Top Spam Scores
156
Figure 74 Network Attack > Antispam > by Score
157
Table 69 Network Attack > Antispam > by Score
157
ZyXEL Communications VANTAGE REPORT - Quick Start Manual (169 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 3 MB
Table of Contents
Table of Contents
1
English
3
Deutsch
23
Español
45
Français
67
Italiano
89
Русский
111
简体中文
133
繁體中文
151
ZyXEL Communications VANTAGE REPORT - Quick Start Manual (119 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
1
English
2
Deutsch
18
Español
34
Français
52
Italiano
70
繁體中文
88
Русский
104
ZyXEL Communications VANTAGE REPORT - Support Notes (18 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
3
Faq
4
Product FAQ
4
What Is Vantage Report (VRPT)
4
Which Operating Systems Are Supported by VRPT Server
4
Which Reports Are Supported by VRPT
4
Which Types of Devices Are by VRPT
4
How Many Devices Are Supported by VRPT
5
Which Components Are Included by VRPT
5
How to Install VRPT Server on the PC
5
How to Access VRPT
5
How Long will Raw Data (Device Logs) be Stored in VRPT Database
6
Application Notes
7
General Application Notes
7
Adding Device to Device Maintenance List of VRPT
7
How to Forward Device Log to VRPT for Analysis and Report
8
How to Enable Traffic Log Feature on Zywall
10
VRPT Server Setup
11
Advanced Application Notes
13
Using Schedule Report
13
How to Check Bandwidth Usage
15
How to Check Intrusion Events
16
Trouble Shooting
18
What to Check if You Can Not Access the GUI of VRPT Server
18
Why Can't I Get the PIE Chart, Even no Data in Monitor
18
ZyXEL Communications VANTAGE REPORT - Quick Start Manual (15 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 1 MB
ZyXEL Communications VANTAGE REPORT - Datasheet (2 pages)
Logging and Reporting Analyzer for ZyWALL Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Measuring Instruments
| Size: 0 MB
Table of Contents
Benefits
1
Centralized Logging & Reporting
1
Comprehensive Set of Predefined Reports
1
Easy-To-Understand Graphic Reports
1
Customizable Scheduled Reports
1
Real Time Event Monitoring
1
Specifications
2
System Specifications
2
Hardware Specifications
2
License
2
Application Diagram
2
Advertisement
Related Products
ZyXEL Communications VANTAGE REPORT - V3.0
ZyXEL Communications Vantage Access
ZyXEL Communications NETATLAS ENTERPRISE V1.02
ZyXEL Communications VANTAGE REPORT - V3
ZyXEL Communications VRPT 2.3
ZyXEL Communications VANTAGE CNM - QUICK GUIDE V3.1
ZyXEL Communications VANTAGE CNM
ZyXEL Communications VANTAGE RADIUS 50
ZyXEL Communications V501
ZyXEL Communications ZyWALL VPN1000
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL