ZyXEL Vantage Report 2.3 User Guide - Page 283
Top Attack Sources
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 283 highlights
Chapter 7 Network Security Each field is described in the following table. Table 116 Report > Network Security > Attack > Top Attacks > Drill-Down LABEL DESCRIPTION graph The graph displays the information in the table visually. Source Color Attacks % of Attacks View Logs Total Back • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the top senders of the selected category of DoS attacks. This field displays what color represents each source in the graph. This field displays the number of DoS attacks in the selected category that came from each source. This field displays what percentage of all DoS attacks in the selected category came from each source. Click this icon to see the logs that go with the record. This entry displays the totals for the sources above. If the number of sources of the selected category of DoS attacks is greater than the maximum number of records displayed in this table, this total might be a little lower than the total in the main report. Click this to return to the main report. 7.2.5 Top Attack Sources Use this report to look at the top sources of DoS attacks by number of attacks. Note: To look at attack reports, each ZyXEL device must record DoS attacks in its log. See the User's Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Attacks is enabled. Vantage Report User's Guide 283