ZyXEL Vantage Report 2.3 User Guide - Page 291
Intrusion Hits Summary
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 291 highlights
Chapter 7 Network Security Each field is described in the following table. Table 120 Report > Network Security > Attack > By Type > Drill-Down LABEL DESCRIPTION graph The graph displays the information in the table visually. Attack • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the DoS attacks in the selected category, sorted by the number of each. Color Attacks % of Attacks View Logs Total Back Each source is identified by its IP address. This field displays what color represents each attack in the graph. This field displays the number of each DoS attack type. This field displays what percentage of all DoS attacks in the selected category belonged to each type. Click this icon to see the logs that go with the record. This entry displays the totals for the attacks above. Click this to return to the main report. 7.3 Intrusion Hits These reports look at intrusion signatures, types of intrusions, severity of intrusions, and the top sources and destinations of intrusions that are logged on the selected ZyXEL device. Intrusions are caused by malicious or suspicious packets sent with the intent of causing harm, illegally accessing resources or interrupting service. They are detected by the selected device's IDP feature. Note: To look at intrusion reports, each ZyXEL device must record intrusions in its log. See the User's Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go to IDP > Signature, and make sure the ZyXEL device logs each Attack Type you want to see in Vantage Report. 7.3.1 Intrusion Hits Summary Use this report to look at the number of intrusions by time interval. Vantage Report User's Guide 291