ZyXEL Vantage Report 2.3 User Guide - Page 196
Top Secure Remote Access Tunnels
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 196 highlights
Chapter 6 Secure Remote Access Each field is described in the following table. Table 80 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Sites > DrillDown LABEL DESCRIPTION graph The graph displays the information in the table visually. Host • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the top sources of Secure Remote Access traffic to the selected peer IPSec router, sorted by the amount of traffic attributed to each one. Color Sessions % of Sessions MBytes Transferred % of MBytes Transferred View Logs Total Back Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. This field displays what color represents each source in the graph. This field displays the number of traffic events from each source to the selected destination. This field displays what percentage each source's number of traffic events makes out of the total number of traffic events for the selected destination. This field displays how much traffic (in megabytes) was generated from each source to the selected destination. This field displays what percentage of the selected destination's Secure Remote Access traffic was generated from each source. Click this icon to see the logs that go with the record. This entry displays the totals for the sources above. If the number of sources of traffic to the selected destination is greater than the maximum number of records displayed in this table, this total might be a little lower than the total in the main report. Click this to return to the main report. 6.1.7 Top Secure Remote Access Tunnels Use this report to look at the Secure Remote Access tunnels with the most Secure Remote Access traffic. 196 Vantage Report User's Guide