Table of Contents
Vantage Report User’s Guide
12
6.1.8 Top Secure Remote Access Tunnels Drill-Down
......................................................
199
6.1.9 Top Secure Remote Access Protocols
.....................................................................
201
6.1.10 Top Secure Remote Access Protocols Drill-Down
.................................................
204
6.1.11 Top Secure Remote Access Hosts
.........................................................................
206
6.1.12 Top Secure Remote Access Hosts Drill-Down
.......................................................
210
6.1.13 Top Secure Remote Access Users
........................................................................
212
6.1.14 Top Secure Remote Access Users Drill-Down
.......................................................
215
6.1.15 Top Secure Remote Access Destinations
..............................................................
217
6.1.16 Top Secure Remote Access Destinations Drill-Down
............................................
220
6.2 Secure Remote Access - Client-to-Site (IPSec)
................................................................
222
6.2.1 Secure Remote Access User Status
........................................................................
223
6.2.2 Secure Remote Access User Status Drill-Down
......................................................
225
6.2.3 Top Secure Remote Access Protocols
.....................................................................
227
6.2.4 Top Secure Remote Access Protocols Drill-Down
...................................................
230
6.2.5 Top Secure Remote Access Destinations
................................................................
232
6.2.6 Top Secure Remote Access Destinations Drill-Down
..............................................
235
6.2.7 Secure Remote Access Top Users
..........................................................................
237
6.2.8 Secure Remote Access Top Users Drill-Down
.........................................................
240
6.3 Secure Remote Access - Client-to-Site (SSL)
...................................................................
242
6.3.1 Secure Remote Access User Status
........................................................................
243
6.3.2 Secure Remote Access User Status Drill-Down
......................................................
245
6.3.3 Top Secure Remote Access Protocols
.....................................................................
246
6.3.4 Top Secure Remote Access Protocols Drill-Down
..............................................................
249
6.3.5 Top Secure Remote Access Destinations
................................................................
251
6.3.6 Top Secure Remote Access Destinations Drill-Down
..............................................
254
6.3.7 Top Secure Remote Access Applications
................................................................
256
6.3.8 Top Secure Remote Access Applications Drill-Down
...............................................
259
6.3.9 Secure Remote Access Top Users
..........................................................................
261
6.3.10 Secure Remote Access Top Users Drill-Down
.......................................................
263
6.4 Xauth
.................................................................................................................................
265
6.4.1 Secure Remote Access Successful Login
...............................................................
265
6.4.2 Secure Remote Access Failed Login
.......................................................................
267
Chapter
7
Network Security
...................................................................................................................
269
7.1 Firewall Access Control
.....................................................................................................
269
7.1.1 Top Users Blocked
...................................................................................................
269
7.1.2 Top Packets Blocked
................................................................................................
272
7.2 Attack
.................................................................................................................................
275
7.2.1 Attack Summary
.......................................................................................................
275
7.2.2 Attack Summary Drill-Down
.....................................................................................
278
7.2.3 Top Attacks
...............................................................................................................
279
7.2.4 Top Attacks Drill-Down
.............................................................................................
282