ZyXEL Vantage Report User Guide - Page 298
Table 123
View all ZyXEL Vantage Report manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 298 highlights
Chapter 7 Network Security Each field is described in the following table. Table 123 Report > Network Security > Intrusion Hits > Top Intrusions LABEL DESCRIPTION Last ... Days Use this field or Settings to specify what historical information is included in the report. Select how many days, ending (and including) today, you want to include. When you change this field, the report updates automatically. You can see the current date range in the title. Settings This field resets to its default value when you click a menu item in the menu panel (including the menu item for the same report). It does not reset when you open or close drill-down reports. Use these fields to specify what historical information is included in the report. Click the settings icon. The Report Display Settings screen appears. graph Intrusion Signature Color 298 Select a specific Start Date and End Date. The date range can be up to 30 days long, but you cannot include days that are older than Store Log Days in System > General Configuration. Click Apply to update the report immediately, or click Cancel to close this screen without any changes. TopN: select the number of records that you want to display. For example, select 10 to display the first 10 records. Keyword: enter part or all of any value you want to look for in the Intrusion Signature field. You can use any printable ASCII characters except the ' and %. The search is case-insensitive. These fields reset to the default values when you click a menu item in the (including the menu item for the same report). It does not reset when you open or close drill-down reports. The graph displays the information in the table visually. • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the top intrusion signatures in the selected device, sorted by the number of intrusions by each one. Click on an intrusion signature to look at the top sources for the selected signature. This field displays what color represents each intrusion signature in the graph. Vantage Report User's Guide