ZyXEL Vantage Report 2.3 User Guide - Page 222
Secure Remote Access - Client-to-Site, IPSec
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 222 highlights
Chapter 6 Secure Remote Access Each field is described in the following table. Table 90 Report > Secure Remote Access > Site-to-Site (IPSec) > Top Destinations > Drill-Down LABEL DESCRIPTION graph The graph displays the information in the table visually. Host • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the top senders or receivers of Secure Remote Access traffic using the selected service, sorted by the amount of traffic attributed to each one. Color Sessions % of Sessions MBytes Transferred % of MBytes Transferred View Logs Total Back Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. This field displays what color represents each host in the graph. This field displays the number of traffic events of each host. This field displays what percentage each host's number of traffic events makes out of the total number of traffic events for the selected Secure Remote Access traffic. This field displays how much traffic (in megabytes) was handled through the Secure Remote Access tunnels for each host. This field displays what percentage of the selected Secure Remote Access traffic belonged to each host. Click this icon to see the logs that go with the record. This entry displays the totals for the services above. By default, only the top hosts are displayed. You can change the number of hosts to be displayed through the TopN setting in Settings. Click this to return to the main report. 6.2 Secure Remote Access - Client-to-Site (IPSec) Secure Remote Access tunnels with the remote gateway set as any are called dynamic tunnels (only the remote device can initiate a dynamic IPSec Secure Remote Access tunnel). Devices can use xauth to authenticate remote users (by username and password) when they try to initiate a dynamic Secure Remote Access tunnel. The Secure Remote Access remote access screens display statistics for remote users that use dynamic Secure Remote Access tunnels and have been authenticated by xauth. 222 Vantage Report User's Guide