Table of Contents
Vantage Report User’s Guide
10
Part II: Monitors, Reports and Logs
.....................................................
63
Chapter
4
Monitor
.....................................................................................................................................
65
4.1 Monitor (Folder)
...................................................................................................................
65
4.1.1 Customize the Column Fields
....................................................................................
66
4.2 Dashboard
...........................................................................................................................
67
4.3 Dashboard
...........................................................................................................................
69
4.4 CPU Usage Monitor
.............................................................................................................
71
4.5 Memory Usage Monitor
.......................................................................................................
72
4.6 Session Usage Monitor
.......................................................................................................
73
4.7 Port Usage Monitor
..............................................................................................................
74
4.8 Interface Usage Monitor
......................................................................................................
75
4.9 Web Monitor
........................................................................................................................
77
4.10 FTP Monitor
.......................................................................................................................
78
4.11 E-Mail Monitor
....................................................................................................................
79
4.12 Site to Site (IPSec) VPN Monitor
.......................................................................................
80
4.13 Client to Site (IPSec) VPN Monitor
....................................................................................
81
4.14 Client to Site (SSL) VPN Monitor
.......................................................................................
82
4.15 Firewall Access Control Monitor
........................................................................................
83
4.16 Attack Monitor
....................................................................................................................
84
4.17 Intrusion Hits
......................................................................................................................
85
4.18 Anti-Virus Monitor
..............................................................................................................
86
4.19 E-Mail Virus Found Monitor
...............................................................................................
87
4.20 Spam Monitor
....................................................................................................................
88
4.21 E-Mail Intrusion Hits Monitor
..............................................................................................
89
4.22 Web Security - Security Threat Monitor
.............................................................................
90
4.23 Web Security Virus Found Monitor
....................................................................................
91
4.24 Web Security Intrusion Hits Monitor
..................................................................................
92
4.25 Content Filter Monitor
........................................................................................................
93
4.26 Application Patrol Monitor
..................................................................................................
94
Chapter
5
Network Traffic
........................................................................................................................
95
5.1 Bandwidth
............................................................................................................................
95
5.1.1 Bandwidth Summary
..................................................................................................
95
5.1.2 Bandwidth Summary Drill-Down
................................................................................
99
5.1.3 Bandwidth Top Protocols
..........................................................................................
100
5.1.4 Bandwidth Top Protocols Drill-Down
........................................................................
104
5.1.5 Top Bandwidth Hosts
...............................................................................................
106
5.1.6 Top Bandwidth Hosts Drill-Down
...............................................................................
110
5.1.7 Top Bandwidth Users
................................................................................................
112
5.1.8 Top Bandwidth Users Drill-Down
...............................................................................
115