Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Software
Vantage Report 3.0
ZyXEL Communications Vantage Report 3.0 Manuals
Manuals and User Guides for ZyXEL Communications Vantage Report 3.0. We have
1
ZyXEL Communications Vantage Report 3.0 manual available for free PDF download: User Manual
ZyXEL Communications Vantage Report 3.0 User Manual (716 pages)
User Guide
Brand:
ZyXEL Communications
| Category:
Software
| Size: 15 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Table of Contents
7
Contents Overview
7
Table of Contents
9
Introduction
19
PART I Introduction
19
Chapter 1 Introducing Vantage Report
21
Introduction
21
License Versions
22
Hardware Requirements
22
Chapter 2 The Vantage Report Server
23
Starting and Stopping the Vantage Report Server
23
E-Mail in the Vantage Report Server
24
Time in the Vantage Report Server
25
Common Terms
25
Common Icons
27
Zyxel Device Configuration and Source Data
27
Chapter 3 The Web Configurator
33
Web Configurator Requirements
33
Web Configurator Access
33
Main Menu Bar
37
The about Screen
37
Device Window
37
Menu Panel
41
Report and Setting Window
52
Device Information Screen
53
Monitors and Statistical Reports
54
View Logs
59
System Dashboard
59
Monitors, Reports and Logs
63
Part II: Monitors, Reports and Logs
63
Monitor
65
Monitor (Folder)
65
Customize the Column Fields
66
Dashboard
67
Dashboard
69
CPU Usage Monitor
71
Memory Usage Monitor
72
Session Usage Monitor
73
Port Usage Monitor
74
Interface Usage Monitor
75
Web Monitor
77
FTP Monitor
78
E-Mail Monitor
79
Site to Site (Ipsec) VPN Monitor
80
Client to Site (Ipsec) VPN Monitor
81
Client to Site (SSL) VPN Monitor
82
Firewall Access Control Monitor
83
Attack Monitor
84
Intrusion Hits
85
Anti-Virus Monitor
86
E-Mail Virus Found Monitor
87
Spam Monitor
88
E-Mail Intrusion Hits Monitor
89
Web Security - Security Threat Monitor
90
Web Security Virus Found Monitor
91
Web Security Intrusion Hits Monitor
92
Content Filter Monitor
93
Application Patrol Monitor
94
Network Traffic
95
Chapter 4 Monitor
65
Bandwidth
95
Bandwidth Summary
95
Chapter 5 Network Traffic
95
Bandwidth Summary Drill-Down
99
Bandwidth Top Protocols
100
Bandwidth Top Protocols Drill-Down
104
Top Bandwidth Hosts
106
Top Bandwidth Hosts Drill-Down
110
Top Bandwidth Users
112
Top Bandwidth Users Drill-Down
115
Top Bandwidth Destinations
117
Top Bandwidth Destinations Drill-Down
121
Top Web Sites
123
Web Traffic
123
Top Web Sites Drill-Down
126
Top Web Hosts
128
Top Web Hosts Drill-Down
131
Top Web Users
133
Top Web Users Drill-Down
136
FTP Traffic
138
Top FTP Sites
138
Top FTP Sites Drill-Down
141
Top FTP Hosts
143
Top FTP Hosts Drill-Down
146
Top FTP Users
148
Top FTP Users Drill-Down
151
Mail Traffic
153
Top Mail Sites
153
Top Mail Sites Drill-Down
156
Top Mail Hosts
158
Top Mail Hosts Drill-Down
161
Top Mail Users
163
Top Mail Users Drill-Down
166
Other Traffic
168
Platform Selection
169
Service Settings
169
Top Destinations of Other Traffic
170
Top Destinations of Other Traffic Drill-Down
173
Top Sources of Other Traffic
174
Top Sources of Other Traffic Drill-Down
177
Top Other Traffic Users
178
Top Users of Other Traffic Drill-Down
181
Chapter 6 Secure Remote Access
183
Secure Remote Access - Site-To-Site (Ipsec)
183
Secure Remote Access Link Status
183
Secure Remote Access Traffic Monitor
185
Top VPN Peer Gateways
186
Top VPN Peer Gateways Drill-Down
189
Top Secure Remote Access Sites
191
Top Secure Remote Access Sites Drill-Down
194
Top Secure Remote Access Tunnels
196
Top Secure Remote Access Tunnels Drill-Down
199
Top Secure Remote Access Protocols
201
Top Secure Remote Access Protocols Drill-Down
204
Top Secure Remote Access Hosts
206
Top Secure Remote Access Hosts Drill-Down
210
Top Secure Remote Access Users
212
Top Secure Remote Access Users Drill-Down
215
Top Secure Remote Access Destinations
217
Top Secure Remote Access Destinations Drill-Down
220
Secure Remote Access - Client-To-Site (Ipsec)
222
Secure Remote Access User Status
223
Secure Remote Access User Status Drill-Down
225
Top Secure Remote Access Protocols
227
Top Secure Remote Access Protocols Drill-Down
230
Top Secure Remote Access Destinations
232
Top Secure Remote Access Destinations Drill-Down
235
Secure Remote Access Top Users
237
Secure Remote Access Top Users Drill-Down
240
Secure Remote Access - Client-To-Site (SSL)
242
Secure Remote Access User Status
243
Secure Remote Access User Status Drill-Down
245
Top Secure Remote Access Protocols
246
Top Secure Remote Access Protocols Drill-Down
249
Top Secure Remote Access Destinations
251
Top Secure Remote Access Destinations Drill-Down
254
Top Secure Remote Access Applications
256
Top Secure Remote Access Applications Drill-Down
259
Secure Remote Access Top Users
261
Secure Remote Access Top Users Drill-Down
263
Secure Remote Access Successful Login
265
Xauth
265
Secure Remote Access Failed Login
267
Virus Found
333
Virus Found Summary
333
Virus Found Summary Drill-Down
336
Top Viruses
337
Top Viruses Drill-Down
340
Top Virus Sources
341
Top Virus Sources Drill-Down
344
Top Virus Destinations
346
Top Virus Destinations Drill-Down
348
Spam
349
Spam Summary
349
Spam Summary Drill-Down
352
Top Spam Senders
353
Top Spam Sources
356
Spam Scores
359
Intrusion Hits
361
Intrusion Hits Summary
361
Intrusion Hits Summary Drill-Down
363
Top Intrusion Hits Signatures
365
Top Intrusion Hits Signatures Drill-Down
367
Top Intrusion Hits Sources
368
Top Intrusion Hits Sources Drill-Down
371
Top Intrusion Hits Destinations
373
Top Intrusion Hits Destinations Drill-Down
376
Intrusion Hits Severities
378
Intrusion Hits Severities Drill-Down
380
Web Security
383
Chapter 7 Network Security
269
Firewall Access Control
269
Network Security
269
Top Users Blocked
269
Top Packets Blocked
272
Attack
275
Attack Summary
275
Attack Summary Drill-Down
278
Top Attacks
279
Top Attacks Drill-Down
282
Top Attack Sources
283
Top Attack Sources Drill-Down
286
Attack Types
288
Attack Types Drill-Down
290
Intrusion Hits
291
Intrusion Hits Summary
291
Intrusion Hits Summary Drill-Down
294
Top Intrusion Hits Signatures
296
Top Intrusion Hits Signatures Drill-Down
299
Top Intrusion Hits Sources
301
Top Intrusion Hits Sources Drill-Down
304
Top Intrusion Hits Destinations
306
Top Intrusion Hits Destinations Drill-Down
309
Intrusion Hits Severities
311
Intrusion Hits Severities Drill-Down
314
Antivirus
315
Antivirus Summary
315
Virus Summary Drill-Down
318
Top Viruses
319
Top Viruses Drill-Down
322
Top Virus Sources
323
Top Virus Sources Drill-Down
326
Top Virus Destinations
328
Top Virus Destinations Drill-Down
330
Chapter 8 E-Mail Security
333
E-Mail Security
333
Chapter 9 Web Security
383
Security Threat
383
Security Threat Summary
383
Security Threat Summary Drill-Down
385
Security Threat Top Web Sites
387
Security Threat Top Sites Drill-Down
390
Security Threat Top Users
391
Security Threat Top Users Drill-Down
394
Security Threat Top Hosts
395
Security Threat Top Hosts Drill-Down
398
Security Threat Categories
399
Security Threat Categories Drill-Down
401
Virus Found
403
Virus Found Summary
403
Virus Found Summary Drill-Down
406
Top Viruses
407
Top Viruses Drill-Down
409
Top Virus Sources
410
Top Virus Sources Drill-Down
413
Top Virus Destinations
414
Top Virus Destinations Drill-Down
417
Intrusion Hits
418
Intrusion Hits Summary
418
Intrusion Hits Summary Drill-Down
421
Top Intrusion Hits Signatures
423
Top Intrusion Hits Signatures Drill-Down
426
Top Intrusion Hits Sources
428
Top Intrusion Hits Sources Drill-Down
431
Top Intrusion Hits Destinations
433
Top Intrusion Hits Destinations Drill-Down
436
Intrusion Hits Severities
438
Intrusion Hits Severities Drill-Down
440
Chapter 10 Security Policy Enforcement
443
Eps
443
What Endpoint Security Can Check
443
EPS Summary
444
View Logs
445
Content Filter (All)
446
Summary
446
Summary Drill-Down
448
Top Sites
450
Top Sites Drill-Down
453
Top Users
455
Top Users Drill-Down
458
Top Hosts
459
Top Hosts Drill-Down
462
By Category
463
By Category Drill-Down
466
Content Filter (Blocked)
467
Summary
467
Summary Drill-Down
469
Top Blocked Sites
471
Top Blocked Sites Drill-Down
474
Top Blocked Users
476
Top Blocked Users Drill-Down
479
Top Blocked Hosts
480
Top Blocked Hosts Drill-Down
483
Blocked Web Categories
484
Blocked Web Categories Drill-Down
487
Application Access Control
488
Top Applications Blocked
488
Top Users Blocked
491
Top Applications Allowed
494
Scheduled Report Summary Screen
509
Customize Daily Report Screen
510
Customize Weekly Report Screen
518
Customize Overtime Report Screen
520
Configure Template List
522
Logo Template
523
Template Add/Edit
523
Logo Template Add/Edit
524
Logs
527
Chapter 11 Event
499
Event
499
Successful Logins
499
Failed Logins
501
Top Sessions Per Host
502
Top Sessions Per User
505
Chapter 12 Schedule Report
509
Schedule Report
509
Chapter 13 Logs
527
Log Viewer
527
By Day (Summary)
531
Log Receiver
531
By Device
533
Log Receiver > by Device > by Category Screen
535
VRPT System Logs
536
File Archiving Settings
538
Log Archiving
538
View Archived Files
541
Log Transfer
543
Log Remove
544
System Setting, User Management and Troubleshooting
547
Part III: System Setting, User Management and Troubleshooting
547
Chapter 14 System Setting
549
General Configuration Screen
549
Configuring for Hostname Reverse
551
Server Configuration Screen
554
Data Backup and Data Restore Screen
555
Data Maintenance Screens
555
Device List Screen
556
Upgrade Screen
557
Registration Screens
558
Registration Summary Screen
559
Registration > Upgrade Screen
560
Notification
561
Add/Edit a Notification
563
Rule-Based Alert
565
Add/Edit a Rule-Based Alert
566
Chapter 15 User Management
577
Group Screen
577
User Management
577
Group > Add/Edit Group Screen
578
Account Screen
579
Account > Add/Edit User Account Screen
580
Troubleshooting
583
Chapter 16 Troubleshooting
583
Appendices and Index
587
Part IV: Appendices and Index
587
Appendix A Product Specifications
589
Appendix B Zywall USG Series and Zywall 1050 Log Descriptions
599
Appendix C Zynos Log Descriptions
645
Appendix D Open Software Announcements
671
Appendix E Legal Information
709
Index
711
Advertisement
Advertisement
Related Products
ZyXEL Communications ZyXEL ZyWALL 35
ZyXEL Communications VANTAGE REPORT -
ZyXEL Communications VANTAGE REPORT - V3
ZyXEL Communications VANTAGE REPORT - V3.0
ZyXEL Communications ZyXEL Prestige 304
ZyXEL Communications ZyXEL ZyWALL 30W
ZyXEL Communications Unified Security Gateway ZyWALL 300
ZyXEL Communications PRESTIGE 324
ZyXEL Communications Prestige 316
Zyxel 3700-24
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL