ZyXEL Vantage Report 2.3 User Guide - Page 450
Top Sites
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 450 highlights
Chapter 10 Security Policy Enforcement Table 193 Report > Security Policy Enforcement > Content Filter (All) > Summary > Drill-Down LABEL DESCRIPTION Host This field displays the top sources of attempts to access specified web sites in the selected time interval, sorted by the number of attempts by each one. Color Attempts % of Attempts View Logs Total Back Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. This field displays what color represents each source in the graph. This field displays the number of attempts by each source to access specified web sites in the selected time interval. This field displays the percentage of all attempts in the selected time interval attributed to each source. Click this icon to see the logs that go with the record. This entry displays the totals for the sources above. If the number of sources in the selected time interval is greater than the maximum number of records displayed in this table, this total might be a little lower than the total in the main report. Click this to return to the main report. 10.2.3 Top Sites Use this report to look at the top destinations of web traffic. Note: To look at security policy reports, each ZyXEL device must record forwarded web packets and blocked web packets in its log. See the User's Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Forward Web Sites, Warning Web Sites and Blocked Web Sites are enabled. 450 Vantage Report User's Guide