ZyXEL Vantage Report User Guide - Page 46
Top Packets
View all ZyXEL Vantage Report manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 46 highlights
Chapter 3 The Web Configurator Table 10 Menu Panel LEVEL 1/2 LEVEL 3 User Status Top Protocols Top Destinations Top Applications Top Users Xauth Successful Login Failed Login Network Security Firewall Access Control Top Users Blocked Top Packets Blocked Attack Summary Top Attacks Top Sources By Type Intrusion Hits FUNCTION Use this report to see which of the device's remote access users are connected. Use this report to display which services the remote access users used the most. You can also use this report to look at the top remote access senders or receivers of any top service. Use this report to look at where the remote SSL VPN users sent the most traffic. You can also use this report to look at the remote access hosts that sent the most traffic to the selected top destination. Use this report to display which SSL VPN applications the remote access users accessed the most. You can also use this report to look at the top remote access senders or receivers of any top application. Use this report to look at the users that send or receive the most VPN traffic. You can also use this report to look at the services sent through VPN from or to a top user. Use this report to monitor the total number of users that have successfully logged in to use one of the device's VPN tunnels. Use this report to monitor the total number of users that have made unsuccessful attempts to log in to use one of the device's VPN tunnels. Use this report to look at the users from which the device blocked the most traffic. Use this report to look at the firewall rule that blocked the most packets. Use these reports to look at Denial-of-Service (DoS) attacks that were detected by the ZyXEL device's firewall. Use this report to look at the number of DoS attacks by time interval. You can also use this report to look at the top categories of DoS attacks in a specific time interval. Use this report to look at the top kinds of DoS attacks by number of attacks. You can also use this report to look at the top categories of DoS attacks for any top source. Use this report to look at the top sources of DoS attacks by number of attacks. You can also use this report to look at the top categories of DoS attacks for any top source. Use this report to look at the top categories of DoS attacks by number of attacks. You can also use this report to look at the top sources of DoS attacks for any top category. 46 Vantage Report User's Guide