Detailed instructions for use are in the User's Guide.
[. . . ] Vantage Report
User's Guide
Version 2. 3 Edition 1 2/2006
Vantage Report User's Guide
Copyright
Copyright © 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Note: Refer also to the Open Software Announcements on page 240.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. [. . . ] This corresponds to IDP > Signature > Attack Type in most ZyXEL devices. This field displays the number of intrusions by the selected source using each intrusion signature.
Intrusion Signature Color Severity Type Intrusions
Chapter 6 Network Attack
124
Vantage Report User's Guide Table 53 Network Attack > Intrusion > Top Sources > Drill-Down
LABEL % of Intrusions Total DESCRIPTION This field displays what percentage of all intrusions by the selected source was made by each intrusion signature. If the number of intrusion signatures from the selected source is greater than the maximum number of records displayed in this table, this total might be a little lower than the total in the main report. Click this to return to the main report.
Back
6. 2. 7 Top Intrusion Destinations
Use this report to look at the top destinations of intrusions by number of intrusions. Note: To look at intrusion reports, each ZyXEL device must record intrusions in its log. In most devices, go to Logs > Log Settings, and make sure IDP is enabled. Then, go to IDP > Signature, and make sure the ZyXEL device logs each Attack Type you want to see in Vantage Report. Click Network Attack > Intrusion > Top Destinations to open this screen.
125
Chapter 6 Network Attack
Vantage Report User's Guide Figure 59 Intrusion > Top Destinations
Each field is described in the following table.
Table 54 Intrusion > Top Destinations
LABEL title Last . . . Days DESCRIPTION This field displays the title of the statistical report. The title includes the date(s) you specified in the Last Days or Settings fields. Use this field or Settings to specify what historical information is included in the report. Select how many days, ending (and including) today, you want to include. This field returns to zero, so you can refresh the report by selecting it again. This field resets to its default value when you click a menu item in the function window (including the menu item for the same report). It does not reset when you open or close drill-down reports.
Chapter 6 Network Attack
126
Vantage Report User's Guide Table 54 Intrusion > Top Destinations
LABEL Settings DESCRIPTION Use this field or Last . . . Days to specify what historical information is included in the report. The Report Display Settings screen appears.
Select a specific Start Date and End Date. The date range can be up to 30 days long, but you cannot include days that are older than Store Log Days in System > General Configuration. Click Apply to update the report immediately, or click Cancel to close this screen without any changes. This field resets to its default value when you click a menu item in the function window (including the menu item for the same report). You can specify the Default Chart Type in System > General Configuration. · Move your mouse over a slice in the pie chart or a bar in the bar chart. [. . . ] YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.
9. Audit Rights ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.
10. Termination This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. [. . . ]