Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Software
VANTAGE REPORT - V3.0
ZyXEL Communications VANTAGE REPORT - V3.0 Manuals
Manuals and User Guides for ZyXEL Communications VANTAGE REPORT - V3.0. We have
1
ZyXEL Communications VANTAGE REPORT - V3.0 manual available for free PDF download: User Manual
ZyXEL Communications VANTAGE REPORT - V3.0 User Manual (458 pages)
Brand:
ZyXEL Communications
| Category:
Software
| Size: 10.01 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Table of Contents
7
Contents Overview
7
Table of Contents
9
List of Figures
17
List of Tables
23
Introduction
29
PART I Introduction
29
Chapter 1 Introducing Vantage Report
31
Introduction
31
Versions
31
Figure 1 Typical Vantage Report Application
31
Table 1 Differences between Basic Version and Full Version
32
Chapter 2 The Vantage Report Server
33
Starting and Stopping the Vantage Report Server
33
E-Mail in the Vantage Report Server
34
Table 2 Processing Times by Menu Item
34
Time in the Vantage Report Server
34
Zyxel Device Configuration and Source Data
35
Table 3 Zynos-Based Zyxel Device Configuration Requirements by Menu Item
35
Table 4 Zywall 1050 Configuration Requirements by Menu Item
36
Chapter 3 The Web Configurator
37
Web Configurator Access
37
Web Configurator Requirements
37
Figure 2 Web Configurator Login Screen
38
Figure 3 Web Configurator Main Screen
39
Device Window
40
Table 5 Title Bar
40
Title Bar
40
Figure 4 Device Window
41
Table 6 Device Window
41
Figure 5 Add/Edit Device and Add/Edit Folder Screens
42
Figure 6 Device Window Right-Click Menu
43
Function Window
43
Table 7 Add/Edit Device and Add/Edit Folder Screen Fields
43
Figure 7 Function Window
44
Table 8 Function Window
44
Table 9 Function Differences for Basic and Full Versions
51
Device Information Screen
52
Figure 8 Function Window Right-Click Menu
52
Figure 9 Device Information Screen
52
Table 10 Device Information Screen Fields
52
Figure 10 Report Window: Monitor and Statistical Report Examples
53
Figure 11 Typical Monitor Layout
53
Figure 12 Report Window Right-Click Menu
54
Table 11 Typical Monitor Features
54
Figure 13 Typical Statistical Report Layout
55
Table 12 Typical Statistical Report Features
55
Figure 14 Report Window Right-Click Menu
56
Dashboard
57
Figure 15 View Logs
57
Table 13 View Logs
57
Figure 16 Dashboard Initial View
58
Figure 17 Dashboard Configure
58
Dashboard
59
Monitors and Statistical Reports
52
Report Window
52
View Logs
56
Figure 18 Dashboard Select Device and Monitor or Summary
59
Figure 19 Dashboard Configured
60
Table 14 Dashboard
61
Monitor and Traffic
63
Part II: Monitor and Traffic
63
Bandwidth Monitor
65
Table 16 Monitor > Service
67
Attack Monitor
68
Intrusion Monitor
68
Monitor
65
Table 15 Monitor > Bandwidth
65
Service Monitor
66
Figure 24 Monitor > Antivirus
70
Table 19 Monitor > Antivirus
70
Figure 25 Monitor > Antispam
71
Table 20 Monitor > Antispam
71
Bandwidth
73
Bandwidth Summary
73
Table 22 Traffic > Bandwidth > Summary > Drill-Down
76
Bandwidth Top Protocols
77
Figure 29 Traffic > Bandwidth > Top Protocol > Drill-Down
80
Table 24 Traffic > Bandwidth > Top Protocol > Drill-Down
80
Top Bandwidth Hosts
81
Figure 30 Traffic > Bandwidth > Top Hosts
82
Table 25 Traffic > Bandwidth > Top Hosts
82
Figure 31 Traffic > Bandwidth > Top Hosts > Drill-Down
84
Top Bandwidth Hosts Drill-Down
84
Top Bandwidth Users
85
Figure 34 Traffic > Bandwidth > Top Destinations
90
Table 29 Traffic > Bandwidth > Top Destinations
90
Figure 35 Traffic > Bandwidth > Top Destinations > Drill-Down
92
Top Bandwidth Destinations Drill-Down
92
Top Web Sites
93
Web Traffic
93
Table 31 Traffic > WEB > Top Sites
94
Top Web Sites Drill-Down
96
Table 37 Traffic > FTP > Top Sites
105
Top FTP Sites Drill-Down
107
Table 50 Traffic > Customization > Top Destinations
128
Top Destinations of Other Traffic Drill-Down
129
Table 52 Traffic > Customization > Top Sources
131
Top Sources of Other Traffic Drill-Down
133
Table 54 Traffic > Customization > Top Users
135
Top Users of Other Traffic Drill-Down
136
Vpn
139
Figure 66 VPN > Site-To-Site > Top Sites
145
Table 60 VPN > Site-To-Site > Top Sites
146
Figure 67 VPN > Site-To-Site > Top Sites > Drill-Down
147
Top VPN Sites Drill-Down
147
Top VPN Tunnels
148
Table 62 VPN > Site-To-Site > Top Tunnels
149
Top VPN Tunnels Drill-Down
151
Top VPN Destinations Drill-Down
167
Table 74 VPN > Remote Access > Top Protocols
171
Table 75 VPN > Remote Access > Top Protocols > Drill-Down
173
Top VPN Protocols Drill-Down
173
Top VPN Destinations
174
Table 76 VPN > Remote Access > Top Destinations
175
Top VPN Destinations Drill-Down
177
Traffic
73
Chapter 4 Monitor
65
Figure 20 Monitor > Bandwidth
65
Figure 21 Monitor > Service
67
Figure 22 Monitor > Attack
68
Table 17 Monitor > Attack
68
Anti-Virus Monitor
69
Figure 23 Monitor > Intrusion
69
Table 18 Monitor > Intrusion
69
Anti-Spam Monitor
70
Figure 85 VPN > Xauth> Failed Login
180
Table 79 VPN > Xauth> Failed Login
180
Network Attack and Security Policy
183
Part III: Network Attack and Security Policy
183
Attack
185
Attack Summary
185
Chapter 5 Traffic
73
Figure 26 Traffic > Bandwidth > Summary
73
Table 21 Traffic > Bandwidth > Summary
74
Bandwidth Summary Drill-Down
75
Figure 27 Traffic > Bandwidth > Summary > Drill-Down
76
Figure 28 Traffic > Bandwidth > Top Protocols
77
Table 23 Traffic > Bandwidth > Top Protocols
78
Bandwidth Top Protocols Drill-Down
79
Table 26 Traffic > Bandwidth > Top Hosts > Drill-Down
85
Figure 32 Traffic > Bandwidth > Top Users
86
Table 27 Traffic > Bandwidth > Top Users
86
Figure 33 Traffic > Bandwidth > Top Users > Drill-Down
88
Table 28 Traffic > Bandwidth > Top Users > Drill-Down
88
Top Bandwidth Users Drill-Down
88
Top Bandwidth Destinations
89
Table 30 Traffic > Bandwidth > Top Destinations > Drill-Down
93
Figure 36 Traffic > WEB > Top Sites
94
Figure 37 Traffic > WEB > Top Sites > Drill-Down
96
Table 32 Traffic > WEB > Top Sites > Drill-Down
96
Top Web Hosts
97
Figure 38 Traffic > WEB > Top Hosts
98
Figure 39 Traffic > WEB > Top Hosts > Drill-Down
100
Figure 40 Traffic > WEB > Top Users
101
Table 35 Traffic > WEB > Top Users
102
Figure 41 Traffic > WEB > Top Users > Drill-Down
103
FTP Traffic
104
Table 36 Traffic > WEB > Top Users > Drill-Down
104
Top FTP Sites
104
Figure 42 Traffic > FTP > Top Sites
105
Figure 43 Traffic > FTP > Top Sites > Drill-Down
107
Table 38 Traffic > FTP > Top Sites > Drill-Down
107
Figure 44 Traffic > FTP > Top Hosts
108
Top FTP Hosts
108
Table 39 Traffic > FTP > Top Hosts
109
Figure 45 Traffic > FTP > Top Hosts > Drill-Down
110
Top FTP Hosts Drill-Down
110
Table 40 Traffic > FTP > Top Hosts > Drill-Down
111
Top FTP Users
111
Figure 46 Traffic > FTP > Top Users
112
Figure 47 Traffic > FTP > Top Users > Drill-Down
114
Table 42 Traffic > FTP > Top Hosts > Drill-Down
114
Mail Traffic
115
Top Mail Sites
115
Figure 48 Traffic > MAIL > Top Sites
116
Table 43 Traffic > MAIL > Top Sites
116
Figure 49 Traffic > MAIL > Top Sites > Drill-Down
118
Table 44 Traffic > MAIL > Top Sites > Drill-Down
118
Top Mail Sites Drill-Down
118
Figure 50 Traffic > MAIL > Top Hosts
119
Top Mail Hosts
119
Table 45 Traffic > MAIL > Top Hosts
120
Figure 51 Traffic > MAIL > Top Hosts > Drill-Down
121
Top Mail Hosts Drill-Down
121
Table 46 Traffic > MAIL > Top Hosts > Drill-Down
122
Top Mail Users
122
Figure 52 Traffic > MAIL > Top Users
123
Table 47 Traffic > MAIL > Top Users
123
Top Mail Users Drill-Down
124
Figure 53 Traffic > MAIL > Top Users > Drill-Down
125
Table 48 Traffic > MAIL > Top Users > Drill-Down
125
Figure 54 Traffic > Customization > Customization (Platform Selection)
126
Other Traffic
126
Platform Selection
126
Service Settings
126
Figure 55 Traffic > Customization > Customization (Service Settings)
127
Table 49 Service > Customization > Customization (Service Settings)
127
Top Destinations of Other Traffic
127
Figure 56 Traffic > Customization > Top Destinations
128
Figure 57 Traffic > Customization > Top Destinations > Drill-Down
130
Top Sources of Other Traffic
131
Table 53 Traffic > Customization > Top Sources > Drill-Down
133
Top Other Traffic Users
134
VPN Link Status
139
VPN Site-To-Site
139
Figure 63 VPN > Site-To-Site > Traffic Monitor
140
Table 56 VPN > Site-To-Site > Link Status
140
Table 57 VPN > Site-To-Site > Traffic Monitor
141
Figure 64 VPN > Site-To-Site > Top Peer Gateways
142
Figure 65 VPN > Site-To-Site > Top Peer Gateways > Drill-Down
144
Table 59 VPN > Site-To-Site > Top Peer Gateways > Drill-Down
144
Top VPN Sites
145
Table 61 VPN > Site-To-Site > Top Sites > Drill-Down
148
Figure 68 VPN > Site-To-Site > Top Tunnels
149
Figure 69 VPN > Site-To-Site > Top Tunnels > Drill-Down
151
Table 63 VPN > Site-To-Site > Top Tunnels > Drill-Down
151
Figure 70 VPN > Site-To-Site > Top Protocols
152
Top VPN Protocols
152
Figure 71 VPN > Site-To-Site > Top Protocols > Drill-Down
155
Figure 72 VPN > Site-To-Site > Top Hosts
156
Table 66 VPN > Site-To-Site > Top Hosts
157
Figure 73 VPN > Site-To-Site > Top Hosts > Drill-Down
159
Table 67 VPN > Site-To-Site > Top Hosts > Drill-Down
159
Top VPN Hosts Drill-Down
159
Top VPN Users
160
Figure 74 VPN > Site-To-Site > Top Users
161
Table 68 VPN > Site-To-Site > Top Users
161
Figure 75 VPN > Site-To-Site > Top Users > Drill-Down
163
Top VPN Users Drill-Down
163
Table 69 VPN > Site-To-Site > Top Users > Drill-Down
164
Top VPN Destinations
164
Figure 76 VPN > Site-To-Site > Top Destinations
165
Table 70 VPN > Site-To-Site > Top Destinations
165
Figure 77 VPN > Site-To-Site > Top Destinations > Drill-Down
167
Table 71 VPN > Site-To-Site > Top Destinations > Drill-Down
168
VPN User Status
169
Top Web Users Drill-Down
103
Table 58 VPN > Site-To-Site > Top Peer Gateways
142
Top VPN Peer Gateways Drill-Down
143
Table 65 VPN > Site-To-Site > Top Protocols > Drill-Down
155
Top VPN Hosts
156
VPN Remote Access
168
VPN Total Users and Traffic
168
Figure 78 VPN > Remote Access > Total Users and Traffic
169
Table 72 VPN > Remote Access > Total Users and Traffic
169
Figure 79 VPN > Remote Access > User Status
170
Table 73 VPN > Remote Access > User Status
170
Top VPN Protocols
170
Figure 80 VPN > Remote Access > Top Protocols
171
Figure 81 VPN > Remote Access > Top Protocols > Drill-Down
173
Figure 82 VPN > Remote Access > Top Destinations
175
Figure 83 VPN > Remote Access > Top Destinations > Drill-Down
177
Figure 84 VPN > Xauth> Successful Login
179
Table 78 VPN > Xauth> Successful Login
179
VPN Failed Login
180
Table 34 Traffic > WEB > Top Hosts > Drill-Down
100
Top Web Users
101
Table 41 Traffic > FTP > Top Users
112
Top FTP Users Drill-Down
113
Table 51 Traffic > Customization > Top Destinations > Drill-Down
130
Figure 58 Traffic > Customization > Top Sources
131
Figure 59 Traffic > Customization > Top Sources > Drill-Down
133
Figure 60 Traffic > Customization > Top Users
134
Figure 61 Traffic > Customization > Top Users > Drill-Down
136
Table 55 Traffic > Customization > Top Users > Drill-Down
137
Chapter 6 VPN
139
Figure 62 VPN > Site-To-Site > Link Status
139
VPN Traffic Monitor
140
Table 33 Traffic > WEB > Top Hosts
98
Top Web Hosts Drill-Down
99
Top VPN Peer Gateways
141
Table 64 VPN > Site-To-Site > Top Protocols
153
Top VPN Protocols Drill-Down
154
Table 77 VPN > Remote Access > Top Destinations > Drill-Down
177
VPN Successful Login
178
Xauth
178
Chapter 7 Network Attack
185
Network Attack
185
Figure 86 Network Attack > Attack > Summary
186
Table 80 Network Attack > Attack > Summary
186
Attack Summary Drill-Down
187
Figure 87 Network Attack > Attack > Summary > Drill-Down
188
Figure 88 Network Attack > Attack > Top Attacks
190
Table 82 Network Attack > Attack > Top Attacks
190
Top Attacks Drill-Down
191
Figure 89 Network Attack > Attack > Top Attacks > Drill-Down
192
Table 83 Network Attack > Attack > Top Attacks > Drill-Down
192
Top Attack Sources
193
Figure 90 Network Attack > Attack > Top Sources
194
Table 84 Network Attack > Attack > Top Sources
194
Top Attack Sources Drill-Down
195
Figure 91 Network Attack > Attack > Top Sources > Drill-Down
196
Table 85 Network Attack > Attack > Top Sources > Drill-Down
196
Attack Types
197
Figure 92 Network Attack > Attack > by Type
197
Attack Types Drill-Down
198
Table 86 Network Attack > Attack > by Type
198
Figure 93 Network Attack > Attack > by Type > Drill-Down
199
Table 87 Network Attack > Attack > by Type > Drill-Down
199
Figure 94 Network Attack > Intrusion > Summary
200
Intrusion Summary Drill-Down
201
Table 88 Network Attack > Intrusion > Summary
201
Figure 95 Network Attack > Intrusion > Summary > Drill-Down
202
Figure 96 Network Attack > Intrusion > Top Intrusions
203
Table 90 Network Attack > Intrusion > Top Intrusions
204
Figure 97 Network Attack > Intrusion > Top Intrusions > Drill-Down
205
Table 91 Network Attack > Intrusion > Top Intrusions > Drill-Down
205
Top Intrusion Signatures Drill-Down
205
Top Intrusion Sources
206
Figure 98 Network Attack > Intrusion > Top Sources
207
Table 92 Network Attack > Intrusion > Top Sources
207
Top Intrusion Sources Drill-Down
208
Figure 99 Network Attack > Intrusion > Top Sources > Drill-Down
209
Table 93 Network Attack > Intrusion > Top Sources > Drill-Down
209
Figure 100 Intrusion > Top Destinations
210
Top Intrusion Destinations
210
Table 94 Intrusion > Top Destinations
211
Figure 101 Network Attack > Intrusion > Top Destinations > Drill-Down
212
Table 95 Network Attack > Intrusion > Top Destinations > Drill-Down
212
Top Intrusion Destinations Drill-Down
212
Intrusion Severities
213
Figure 102 Network Attack > Intrusion > by Severity
214
Table 96 Network Attack > Intrusion > by Severity
214
Intrusion Severities Drill-Down
215
Figure 103 Network Attack > Intrusion > by Severity > Drill-Down
216
Table 97 Network Attack > Intrusion > by Severity > Drill-Down
216
Antivirus
217
Figure 104 Network Attack > Antivirus > Summary
217
Virus Summary
217
Table 98 Network Attack > Antivirus > Summary
218
Virus Summary Drill-Down
218
Figure 105 Network Attack > Antivirus > Summary > Drill-Down
219
Table 99 Network Attack > Antivirus > Summary > Drill-Down
219
Top Viruses
220
Figure 106 Network Attack > Antivirus > Top Viruses
221
Table 100 Network Attack > Antivirus > Top Viruses
221
Top Viruses Drill-Down
222
Figure 107 Network Attack > Antivirus > Top Viruses > Drill-Down
223
Table 101 Network Attack > Antivirus > Top Viruses > Drill-Down
223
Top Virus Sources
224
Figure 108 Network Attack > Antivirus > Top Sources
225
Table 102 Network Attack > Antivirus > Top Sources
225
Top Virus Sources Drill-Down
226
Figure 109 Network Attack > Antivirus > Top Sources > Drill-Down
227
Table 103 Network Attack > Antivirus > Top Sources > Drill-Down
227
Top Virus Destinations
228
Figure 110 Network Attack > Antivirus > Top Destinations
229
Table 104 Network Attack > Antivirus > Top Destinations
229
Top Virus Destinations Drill-Down
230
Figure 111 Network Attack > Antivirus > Top Destinations > Drill-Down
231
Table 105 Network Attack > Antivirus > Top Destinations > Drill-Down
231
Antispam
232
Spam Summary
232
Figure 112 Network Attack > Antispam > Summary
233
Table 106 Network Attack > Antispam > Summary
233
Spam Summary Drill-Down
234
Figure 113 Network Attack > Antispam > Summary > Drill-Down
235
Table 107 Network Attack > Antispam > Summary > Drill-Down
235
Top Spam Senders
236
Figure 114 Network Attack > Antispam > Top Senders
237
Table 108 Network Attack > Antispam > Top Senders
237
Top Spam Sources
238
Figure 115 Network Attack > Antispam > Top Sources
239
Table 109 Network Attack > Antispam > Top Sources
239
Spam Scores
240
Figure 116 Network Attack > Antispam > by Score
241
Table 110 Network Attack > Antispam > by Score
241
Security Policy
243
Table 111 Security Policy > Firewall Access Control > Top Users Blocked
244
Top Packets Blocked
245
Table 112 Security Policy > Firewall Access Control > Top Packets Blocked
246
Application Access Control
247
Top Applications Blocked
247
Table 113 Security Policy > Application Access Control > Top Applications Blocked
248
Top Users Blocked
249
Table 114 Security Policy > Application Access Control > Top Applications Blocked
250
Top Applications Allowed
251
Table 115 Security Policy > Application Access Control > Top Applications Allowed
252
Blocked Web Accesses
253
Table 116 Security Policy > WEB Blocked > Summary
254
Web Block Summary
254
Web Block Summary Drill-Down
255
Table 117 Security Policy > WEB Blocked > Summary > Drill-Down
256
Top Blocked Web Sites
257
Table 118 Security Policy > WEB Blocked > Top Sites
258
Table 119 Security Policy > WEB Blocked > Top Sites > Drill-Down
259
Top Blocked Web Sites Drill-Down
259
Top Blocked Web Hosts
260
Table 120 Security Policy > WEB Blocked > Top Hosts
261
Table 121 Security Policy > WEB Blocked > Top Hosts > Drill-Down
262
Top Blocked Web Hosts Drill-Down
262
Top Blocked Web Users
263
Table 122 Security Policy > WEB Blocked > Top Users
264
Top Blocked Web Users Drill-Down
265
Blocked Web Categories
267
Table 124 Security Policy > WEB Blocked > by Category
268
Figure 131 Security Policy > WEB Blocked > by Category > Drill-Down
269
Table 125 Security Policy > WEB Blocked > by Category > Drill-Down
269
Allowed Web Accesses
270
Figure 132 Security Policy > WEB Allowed > Summary
270
Web Allowed Summary
270
Table 126 Security Policy > WEB Allowed > Summary
271
Web Allowed Summary Drill-Down
271
Figure 133 Security Policy > WEB Allowed > Summary > Drill-Down
272
Table 127 Security Policy > WEB Allowed > Summary > Drill-Down
272
Top Allowed Web Sites
273
Figure 134 Security Policy > WEB Allowed > Top Sites
274
Table 128 Security Policy > WEB Allowed > Top Sites
274
Top Allowed Web Sites Drill-Down
275
Figure 135 Security Policy > WEB Allowed > Top Sites > Drill-Down
276
Table 129 Security Policy > WEB Allowed > Top Sites > Drill-Down
276
Figure 136 Security Policy > WEB Allowed > Top Hosts
277
Top Allowed Web Hosts
277
Table 130 Security Policy > WEB Allowed > Top Hosts
278
Figure 137 Security Policy > WEB Allowed > Top Hosts > Drill-Down
279
Table 131 Security Policy > WEB Allowed > Top Hosts > Drill-Down
279
Top Allowed Web Hosts Drill-Down
279
Top Allowed Web Users
280
Figure 138 Security Policy > WEB Allowed > Top Users
281
Table 132 Security Policy > WEB Allowed > Top Users
281
Top Allowed Web Users Drill-Down
282
Table 81 Network Attack > Attack > Summary > Drill-Down
188
Top Attacks
189
Table 89 Network Attack > Intrusion > Summary > Drill-Down
202
Top Intrusion Signatures
203
Chapter 8 Security Policy
243
Intrusion
200
Intrusion Summary
200
Firewall Access Control
243
Top Users Blocked
243
Figure 117 Security Policy > Firewall Access Control > Top Users Blocked
244
Figure 118 Security Policy > Firewall Access Control > Top Packets Blocked
246
Figure 119 Security Policy > Application Access Control > Top Applications Blocked
248
Figure 120 Security Policy > Application Access Control > Top Users Blocked
250
Figure 121 Security Policy > Application Access Control > Top Applications Allowed
252
Figure 122 Security Policy > WEB Blocked > Summary
254
Figure 123 Security Policy > WEB Blocked > Summary > Drill-Down
256
Figure 124 Security Policy > WEB Blocked > Top Sites
257
Figure 125 Security Policy > WEB Blocked > Top Sites > Drill-Down
259
Figure 126 Security Policy > WEB Blocked > Top Hosts
260
Figure 127 Security Policy > WEB Blocked > Top Hosts > Drill-Down
262
Figure 128 Security Policy > WEB Blocked > Top Users
264
Figure 129 Security Policy > WEB Blocked > Top Users > Drill-Down
266
Table 123 Security Policy > WEB Blocked > Top Users > Drill-Down
266
Figure 130 Security Policy > WEB Blocked > by Category
267
Blocked Web Categories Drill-Down
268
Figure 139 Security Policy > WEB Allowed > Top Users > Drill-Down
283
Table 133 Security Policy > WEB Allowed > Top Users > Drill-Down
283
Event, Log Viewer and Schedule Report
285
Part IV: Event, Log Viewer and Schedule Report
285
Event
287
Successful Logins
287
Table 134 Event > Login > Successful Login
288
Figure 141 Event > Login > Failed Login
289
Figure 142 Event > Session Per Host > Top Hosts
290
Table 136 Event > Session Per Host > Top Hosts
291
Figure 143 Event > Session Per Host > Top Users
292
Top Sessions Per User
292
Table 137 Event > Session Per Host > Top Users
293
Log Viewer
295
Schedule Report
299
Table 139 Schedule Report > Summary
300
Customize Daily Report Screen
301
Table 140 Schedule Report > Summary > Add (Daily Report)
303
Customize Weekly Report Screen
304
Table 141 Schedule Report > Summary > Add (Weekly Report)
306
Customize Overtime Report Screen
307
Table 135 Event > Device Login > Failed Login
289
Top Sessions Per Host
290
Chapter 9 Event
287
Figure 140 Event > Login > Successful Login
287
Failed Logins
288
Figure 149 Schedule Report > Template
311
Table 143 Schedule Report > Template
311
Figure 150 Schedule Report > Template > Add
312
Table 144 Schedule Report > Template > Add
312
System and Troubleshooting
315
Part V: System and Troubleshooting
315
Chapter 10 Log Viewer
295
Figure 144 Log Viewer > All Logs
296
Table 138 Log Viewer > All Logs
296
Chapter 11 Schedule Report
299
Scheduled Report Summary Screen
299
Figure 145 Schedule Report > Summary
300
Figure 146 Schedule Report > Summary > Add (Daily Report))
302
Figure 147 Schedule Report > Summary > Add (Weekly Report)
305
Figure 148 Schedule Report > Summary > Add (Overtime Report)
308
Table 142 Schedule Report > Summary > Add (Overtime Report)
309
Template List
310
Template Add/Edit
311
Chapter 12 System
317
General Configuration Screen
317
System
317
Configuring for Hostname Reverse
318
Figure 151 System > General Configuration
318
Table 145 System > General Configuration
318
Figure 152 Windows XP: Start Menu
319
Figure 153 Windows XP: Control Panel
320
Figure 154 Windows XP: Control Panel: Network Connections: Properties
320
Figure 155 Windows XP: Local Area Connection Properties
321
Figure 157 System > Server Configuration
322
Table 146 System > Server Configuration
322
Figure 158 System > User Management
323
Table 147 System > User Management
323
User Management Screens
323
User Management Summary Screen
323
Add/Edit User Account Screen
324
Figure 159 Add/Edit User Account Screen
324
Table 148 Add/Edit User Account Screen
324
Data Backup and Data Restore Screen
325
Data Maintenance Screens
325
Figure 160 System > Data Maintenance > Configuration
325
Device List Export and Device List Import Screen
326
Figure 161 System > Data Maintenance > Device List
326
Table 149 System > Data Maintenance > Configuration
326
Table 150 System > Data Maintenance > Device List
326
Figure 162 System > Upgrade
327
Registration Screens
327
Table 151 System > Upgrade
327
Upgrade Screen
327
Figure 163 System > Registration
328
Registration Summary Screen
328
Table 152 Information for Using an Existing Myzyxel.com Account
328
Table 153 Information for Upgrading the Version or Number of Devices
328
Table 154 System > Registration
328
Figure 164 Registration Screen
329
Log Receiver by Day Screen
330
Log Receiver Screens
330
Table 155 Registration Screen
330
Figure 165 System > Log Receiver by Day(Summary)
331
Figure 166 System > Log Receiver by Day(Summary) > by Device
331
Log Receiver by Day > by Device Screen
331
Table 156 System > Log Receiver by Day(Summary)
331
Table 157 System > Log Receiver by Day(Summary) > by Device
331
Figure 167 System > Log Receiver by Day(Summary) > by Device > by Category
332
Log Receiver by Day > by Device > by Category Screen
332
Log Receiver by Device Screen
332
Table 158 System > Log Receiver by Day(Summary) > by Device > by Category
332
Figure 168 System > Log Receiver by Device)
333
Log Receiver by Device > by Category Screen
333
Table 159 System > Log Receiver by Device
333
About Screen
334
Figure 169 System > Log Receiver by Device > by Category
334
Figure 170 System > about
334
Table 160 System > Log Receiver by Device > by Category
334
Troubleshooting
335
Registration Screen
329
Figure 156 Windows XP: Advanced TCP/IP Settings: WINS
321
Server Configuration Screen
322
Chapter 13 Troubleshooting
335
Table 161 Troubleshooting
335
Appendices and Index
337
Part VI: Appendices and Index
337
Table 190 as Directions for Single WAN Devices
371
Syslog Logs
372
Appendix A Product Specifications
339
Table 162 Web Configurator Specifications
339
Table 163 System Notifications Specifications
339
Table 164 Feature Specifications
339
Table 165 Key Features
339
Table 166 VRPT 3.0 Device and Feature Support
340
Appendix B Setting up Your Computer's IP Address
345
Figure 171 Windows XP: Start Menu
346
Figure 172 Windows XP: Control Panel
346
Figure 173 Windows XP: Control Panel: Network Connections: Properties
347
Figure 174 Windows XP: Local Area Connection Properties
347
Figure 175 Windows XP: Advanced TCP/IP Settings
348
Figure 176 Windows XP: Internet Protocol (TCP/IP) Properties
349
Appendix C Zynos Log Descriptions
351
Table 167 System Maintenance Logs
351
Table 168 System Error Logs
353
Table 169 Access Control Logs
353
Table 170 TCP Reset Logs
354
Table 171 Packet Filter Logs
355
Table 172 ICMP Logs
355
Table 173 CDR Logs
355
Table 174 PPP Logs
356
Table 175 Upnp Logs
356
Table 176 Content Filtering Logs
356
Table 177 Attack Logs
357
Table 178 Remote Management Logs
358
Table 179 Wireless Logs
359
Table 180 Ipsec Logs
359
Table 181 IKE Logs
360
Table 182 PKI Logs
363
Table 183 802.1X Logs
365
Table 184 ACL Setting Notes
366
Table 185 ICMP Notes
366
Table 186 IDP Logs
368
Table 187 AV Logs
368
Table 188 as Logs
370
Table 189 as Directions for Multiple WAN Devices
371
Table 191 Syslog Logs
372
Table 192 RFC-2408 ISAKMP Payload Types
373
Appendix D Zywall 1050 Log Descriptions
375
Table 193 Content Filter Logs
375
Table 194 Forward Web Site Logs
375
Table 195 Blocked Web Site Logs
375
Table 196 User Logs
377
Table 197 Myzyxel.com Logs
378
Table 198 IDP Logs
382
Table 199 Application Patrol Logs
385
Table 200 IKE Logs
387
Table 201 Ipsec Logs
391
Table 202 Firewall Logs
392
Table 203 Sessions Limit Logs
393
Table 204 Policy Route Logs
393
Table 205 Built-In Services Logs
394
Table 206 System Logs
397
Table 207 Connectivity Check Logs
401
Table 208 Device HA Logs
403
Table 209 Routing Protocol Logs
405
Table 210 NAT Logs
407
Table 211 PKI Logs
408
Table 212 Interface Logs
411
Table 213 Account Logs
414
Table 214 Port Grouping Logs
414
Table 215 Force Authentication Logs
414
Table 216 File Manager Logs
415
Appendix E Open Software Announcements
417
Appendix F Legal Information
447
Appendix G Customer Support
449
Index
453
Advertisement
Advertisement
Related Products
ZyXEL Communications VANTAGE REPORT -
ZyXEL Communications NETATLAS ENTERPRISE V1.02
ZyXEL Communications VANTAGE REPORT - V3
ZyXEL Communications VRPT 2.3
ZyXEL Communications VANTAGE CNM - QUICK GUIDE V3.1
ZyXEL Communications Vantage Access
ZyXEL Communications VANTAGE RADIUS 50
ZyXEL Communications VANTAGE CNM
ZyXEL Communications VMG892-B10A
ZyXEL Communications VES-1616/24FA-5x Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL