ZyXEL VRPT User guide

Category
Software
Type
User guide
www.zyxel.com
www.zyxel.com
Vantage Report
IMPORTANT!
READ CAREFULLY
BEFORE USE.
KEEP THIS GUIDE
FOR FUTURE
REFERENCE.
Copyright © 2013
ZyXEL Communications Corporation
Version 3.8
Edition 1, 2/2013
Default Login Details
LAN IP
Address
http://{Vantage
Report server’s IP
address}:8080/vrpt
User Name root
Password root
Vantage Report 3.8 User’s Guide2
IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
Graphics in this book may differ slightly from the product due to differences in operating systems,
operating system versions, or if you installed updated firmware/software for your device. Every
effort has been made to ensure that the information in this manual is accurate.
Related Documentation
• Download software and documentation (User’s Guide, Quick Start Guide, Datasheet, Support
Notes) from one of the FTP sites:
Europe: ftp://ftp.zyxel.dk/Vantage_Report
Rest of World: ftp://ftp.zyxel.com/Vantage_Report
• Vantage Report Online Help
Embedded web help for descriptions of individual screens and supplementary information.
Contents Overview
Vantage Report 3.8 User’s Guide
3
Contents Overview
User’s Guide .......................................................................................................................................15
Introducing Vantage Report ....................................................................................................................17
The Vantage Report Server ....................................................................................................................19
The Web Configurator .............................................................................................................................27
Technical Reference ..........................................................................................................................53
Monitor ....................................................................................................................................................55
Network Traffic ........................................................................................................................................85
Secure Remote Access .........................................................................................................................157
Network Security ...................................................................................................................................223
E-Mail Security ......................................................................................................................................269
Web Security .........................................................................................................................................311
Security Policy Enforcement .................................................................................................................361
Event .....................................................................................................................................................407
Schedule Report ...................................................................................................................................423
Logs ......................................................................................................................................................441
System Setting ......................................................................................................................................457
User Management .................................................................................................................................481
Troubleshooting ....................................................................................................................................487
Contents Overview
Vantage Report 3.8 User’s Guide
4
Table of Contents
Vantage Report 3.8 User’s Guide
5
Table of Contents
Contents Overview ..............................................................................................................................3
Table of Contents .................................................................................................................................5
Part I: User’s Guide .........................................................................................15
Chapter 1
Introducing Vantage Report...............................................................................................................17
1.1 Introduction .......................................................................................................................................17
1.2 License Versions ...............................................................................................................................18
1.3 Hardware Requirements ...................................................................................................................18
Chapter 2
The Vantage Report Server................................................................................................................19
2.1 Starting and Stopping the Vantage Report Server ............................................................................19
2.2 E-Mail in the Vantage Report Server .................................................................................................20
2.3 Time in the Vantage Report Server ...................................................................................................20
2.4 Common Terms .................................................................................................................................20
2.5 Common Icons ..................................................................................................................................22
2.6 ZyXEL Device Configuration and Source Data .................................................................................22
Chapter 3
The Web Configurator........................................................................................................................27
3.1 Web Configurator Requirements .......................................................................................................27
3.2 Web Configurator Access .................................................................................................................27
3.3 Main Menu Bar ..................................................................................................................................29
3.3.1 The About Screen ...................................................................................................................30
3.4 Device Window .................................................................................................................................30
3.5 Menu Panel .......................................................................................................................................33
3.6 System Dashboard ............................................................................................................................43
3.6.1 Device Monitor Widget Settings ..............................................................................................46
3.7 Report and Setting Window ..............................................................................................................46
3.7.1 Device Information Screen ......................................................................................................47
3.7.2 Monitors and Statistical Reports ..............................................................................................48
3.7.3 View Logs ..............................................................................................................................52
Part II: Technical Reference............................................................................53
Table of Contents
Vantage Report 3.8 User’s Guide
6
Chapter 4
Monitor.................................................................................................................................................55
4.1 Monitor (Folder) ................................................................................................................................55
4.1.1 Customize the Column Fields ..................................................................................................55
4.2 Dashboard .........................................................................................................................................57
4.3 Dashboard .........................................................................................................................................58
4.4 CPU Usage Monitor ..........................................................................................................................60
4.5 Memory Usage Monitor .....................................................................................................................61
4.6 Session Usage Monitor .....................................................................................................................62
4.7 Port Usage Monitor ...........................................................................................................................63
4.8 Interface Usage Monitor ....................................................................................................................64
4.9 Web Monitor ......................................................................................................................................65
4.10 FTP Monitor ....................................................................................................................................66
4.11 E-Mail Monitor .................................................................................................................................67
4.12 Site to Site (IPSec) VPN Monitor ....................................................................................................68
4.13 Client to Site (IPSec) VPN Monitor .................................................................................................69
4.14 Client to Site (SSL) VPN Monitor ....................................................................................................70
4.15 Firewall Access Control Monitor ......................................................................................................71
4.16 Attack Monitor .................................................................................................................................72
4.17 Intrusion Hits ...................................................................................................................................73
4.18 Anti-Virus Monitor ............................................................................................................................74
4.19 E-Mail Virus Found Monitor .............................................................................................................75
4.20 Spam Monitor ..................................................................................................................................76
4.21 E-Mail Intrusion Hits Monitor ...........................................................................................................77
4.22 Web Security - Security Threat Monitor ..........................................................................................78
4.23 Web Security Virus Found Monitor .................................................................................................79
4.24 Web Security Intrusion Hits Monitor ................................................................................................80
4.25 Content Filter Monitor ......................................................................................................................81
4.26 Application Patrol Monitor ...............................................................................................................82
4.27 DHCP Leasing Monitor ..................................................................................................................82
Chapter 5
Network Traffic....................................................................................................................................85
5.1 Bandwidth .........................................................................................................................................85
5.1.1 Bandwidth Summary ...............................................................................................................85
5.1.2 Bandwidth Summary Drill-Down ..............................................................................................88
5.1.3 Bandwidth Top Protocols .........................................................................................................90
5.1.4 Bandwidth Top Protocols Drill-Down ........................................................................................93
5.1.5 Top Bandwidth Hosts ...............................................................................................................95
5.1.6 Top Bandwidth Hosts Drill-Down .............................................................................................99
5.1.7 Top Bandwidth Users .............................................................................................................100
5.1.8 Top Bandwidth Users Drill-Down ...........................................................................................103
5.1.9 Top Bandwidth Destinations ..................................................................................................104
Table of Contents
Vantage Report 3.8 User’s Guide
7
5.1.10 Top Bandwidth Destinations Drill-Down ...............................................................................107
5.2 Web Traffic ......................................................................................................................................108
5.2.1 Top Web Sites ........................................................................................................................108
5.2.2 Top Web Sites Drill-Down ...................................................................................................... 111
5.2.3 Top Web Hosts ......................................................................................................................112
5.2.4 Top Web Hosts Drill-Down .....................................................................................................115
5.2.5 Top Web Users .....................................................................................................................116
5.2.6 Top Web Users Drill-Down .....................................................................................................119
5.3 FTP Traffic .......................................................................................................................................120
5.3.1 Top FTP Sites ........................................................................................................................120
5.3.2 Top FTP Sites Drill-Down ......................................................................................................123
5.3.3 Top FTP Hosts .......................................................................................................................124
5.3.4 Top FTP Hosts Drill-Down .....................................................................................................127
5.3.5 Top FTP Users .......................................................................................................................128
5.3.6 Top FTP Users Drill-Down .....................................................................................................131
5.4 Mail Traffic .......................................................................................................................................132
5.4.1 Top Mail Sites ........................................................................................................................132
5.4.2 Top Mail Sites Drill-Down .......................................................................................................135
5.4.3 Top Mail Hosts .......................................................................................................................136
5.4.4 Top Mail Hosts Drill-Down ......................................................................................................139
5.4.5 Top Mail Users .......................................................................................................................140
5.4.6 Top Mail Users Drill-Down ....................................................................................................143
5.5 Other Traffic ....................................................................................................................................144
5.5.1 Service Settings ....................................................................................................................144
5.5.2 Top Destinations of Other Traffic ...........................................................................................146
5.5.3 Top Destinations of Other Traffic Drill-Down ..........................................................................148
5.5.4 Top Sources of Other Traffic ..................................................................................................149
5.5.5 Top Sources of Other Traffic Drill-Down ................................................................................151
5.5.6 Top Other Traffic Users ..........................................................................................................152
5.5.7 Top Users of Other Traffic Drill-Down ..................................................................................155
Chapter 6
Secure Remote Access....................................................................................................................157
6.1 Secure Remote Access - Site-to-Site (IPSec) .................................................................................157
6.1.1 Secure Remote Access Link Status ......................................................................................157
6.1.2 Secure Remote Access Traffic Monitor .................................................................................158
6.1.3 Top Secure Remote Access Sites .........................................................................................159
6.1.4 Top Secure Remote Access Sites Drill-Down ........................................................................162
6.1.5 Top Secure Remote Access Tunnels .....................................................................................163
6.1.6 Top Secure Remote Access Tunnels Drill-Down ...................................................................166
6.1.7 Top Secure Remote Access Protocols ..................................................................................167
6.1.8 Top Secure Remote Access Protocols Drill-Down .................................................................170
6.1.9 Top Secure Remote Access Hosts ........................................................................................171
Table of Contents
Vantage Report 3.8 User’s Guide
8
6.1.10 Top Secure Remote Access Hosts Drill-Down .....................................................................174
6.1.11 Top Secure Remote Access Users ......................................................................................175
6.1.12 Top Secure Remote Access Users Drill-Down ....................................................................178
6.1.13 Top Secure Remote Access Destinations ...........................................................................179
6.1.14 Top Secure Remote Access Destinations Drill-Down ..........................................................182
6.2 Secure Remote Access - Client-to-Site (IPSec) ..............................................................................183
6.2.1 Secure Remote Access User Status .....................................................................................183
6.2.2 Secure Remote Access User Status Drill-Down ....................................................................186
6.2.3 Top Secure Remote Access Protocols ..................................................................................187
6.2.4 Top Secure Remote Access Protocols Drill-Down .................................................................190
6.2.5 Top Secure Remote Access Destinations .............................................................................191
6.2.6 Top Secure Remote Access Destinations Drill-Down ............................................................194
6.2.7 Secure Remote Access Top Users ........................................................................................195
6.2.8 Secure Remote Access Top Users Drill-Down ......................................................................198
6.3 Secure Remote Access - Client-to-Site (SSL) ................................................................................199
6.3.1 Secure Remote Access User Status .....................................................................................199
6.3.2 Secure Remote Access User Status Drill-Down ....................................................................201
6.3.3 Top Secure Remote Access Protocols ..................................................................................203
6.3.4 Top Secure Remote Access Protocols Drill-Down ..............................................................................206
6.3.5 Top Secure Remote Access Destinations .............................................................................207
6.3.6 Top Secure Remote Access Destinations Drill-Down ............................................................209
6.3.7 Top Secure Remote Access Applications ..............................................................................210
6.3.8 Top Secure Remote Access Applications Drill-Down ............................................................213
6.3.9 Secure Remote Access Top Users ........................................................................................214
6.3.10 Secure Remote Access Top Users Drill-Down ....................................................................217
6.4 Xauth ...............................................................................................................................................218
6.4.1 Secure Remote Access Successful Login .............................................................................218
6.4.2 Secure Remote Access Failed Login .................................................................................220
Chapter 7
Network Security ..............................................................................................................................223
7.1 Firewall Access Control ...................................................................................................................223
7.1.1 Top Users Blocked .................................................................................................................223
7.1.2 Top Packets Blocked .............................................................................................................225
7.2 Attack ..............................................................................................................................................227
7.2.1 Attack Summary ....................................................................................................................227
7.2.2 Attack Summary Drill-Down ...................................................................................................229
7.2.3 Top Attacks ............................................................................................................................231
7.2.4 Top Attacks Drill-Down ...........................................................................................................232
7.2.5 Top Attack Sources ................................................................................................................234
7.2.6 Top Attack Sources Drill-Down ..............................................................................................236
7.2.7 Attack Types ..........................................................................................................................237
7.2.8 Attack Types Drill-Down .........................................................................................................238
Table of Contents
Vantage Report 3.8 User’s Guide
9
7.3 Intrusion Hits ...................................................................................................................................240
7.3.1 Intrusion Hits Summary .........................................................................................................240
7.3.2 Intrusion Hits Summary Drill-Down ........................................................................................241
7.3.3 Top Intrusion Hits Signatures .................................................................................................243
7.3.4 Top Intrusion Hits Signatures Drill-Down ...............................................................................246
7.3.5 Top Intrusion Hits Sources .....................................................................................................247
7.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................................250
7.3.7 Top Intrusion Hits Destinations ..............................................................................................251
7.3.8 Top Intrusion Hits Destinations Drill-Down .............................................................................253
7.3.9 Intrusion Hits Severities ........................................................................................................254
7.3.10 Intrusion Hits Severities Drill-Down .....................................................................................255
7.4 Antivirus ..........................................................................................................................................257
7.4.1 Antivirus Summary ................................................................................................................257
7.4.2 Virus Summary Drill-Down .....................................................................................................258
7.4.3 Top Viruses ............................................................................................................................260
7.4.4 Top Viruses Drill-Down ..........................................................................................................261
7.4.5 Top Virus Sources ..................................................................................................................263
7.4.6 Top Virus Sources Drill-Down ...............................................................................................265
7.4.7 Top Virus Destinations ...........................................................................................................266
7.4.8 Top Virus Destinations Drill-Down ......................................................................................267
Chapter 8
E-Mail Security..................................................................................................................................269
8.1 Virus Found .....................................................................................................................................269
8.1.1 Virus Found Summary ...........................................................................................................269
8.1.2 Virus Found Summary Drill-Down .........................................................................................271
8.1.3 Top Viruses ............................................................................................................................273
8.1.4 Top Viruses Drill-Down ..........................................................................................................274
8.1.5 Top Virus Sources ..................................................................................................................276
8.1.6 Top Virus Sources Drill-Down ...............................................................................................278
8.1.7 Top Virus Destinations ...........................................................................................................279
8.1.8 Top Virus Destinations Drill-Down .........................................................................................281
8.2 Spam ...............................................................................................................................................282
8.2.1 Spam Summary .....................................................................................................................282
8.2.2 Spam Summary Drill-Down ...................................................................................................283
8.2.3 Top Spam Senders ................................................................................................................285
8.2.4 Top Spam Sender IP Addresses ............................................................................................286
8.2.5 Top Spam Subjects ................................................................................................................288
8.2.6 Spam By Category .................................................................................................................290
8.3 Intrusion Hits ...................................................................................................................................292
8.3.1 Intrusion Hits Summary .........................................................................................................292
8.3.2 Intrusion Hits Summary Drill-Down ........................................................................................294
8.3.3 Top Intrusion Hits Signatures .................................................................................................296
Table of Contents
Vantage Report 3.8 User’s Guide
10
8.3.4 Top Intrusion Hits Signatures Drill-Down ...............................................................................299
8.3.5 Top Intrusion Hits Sources .....................................................................................................300
8.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................................303
8.3.7 Top Intrusion Hits Destinations ..............................................................................................304
8.3.8 Top Intrusion Hits Destinations Drill-Down .............................................................................306
8.3.9 Intrusion Hits Severities ........................................................................................................307
8.3.10 Intrusion Hits Severities Drill-Down ...................................................................................308
Chapter 9
Web Security.....................................................................................................................................311
9.1 Security Threat ................................................................................................................................311
9.1.1 Security Threat Summary ......................................................................................................311
9.1.2 Security Threat Summary Drill-Down ....................................................................................313
9.1.3 Security Threat Top Web Sites ..............................................................................................315
9.1.4 Security Threat Top Sites Drill-Down .....................................................................................317
9.1.5 Security Threat Top Users .....................................................................................................318
9.1.6 Security Threat Top Users Drill-Down ...................................................................................320
9.1.7 Security Threat Top Hosts .....................................................................................................322
9.1.8 Security Threat Top Hosts Drill-Down ....................................................................................324
9.1.9 Security Threat Categories ....................................................................................................325
9.1.10 Security Threat Categories Drill-Down ................................................................................326
9.2 Virus Found .....................................................................................................................................328
9.2.1 Virus Found Summary ...........................................................................................................328
9.2.2 Virus Found Summary Drill-Down .........................................................................................329
9.2.3 Top Viruses ............................................................................................................................331
9.2.4 Top Viruses Drill-Down ..........................................................................................................332
9.2.5 Top Dangerous URLs ............................................................................................................334
9.2.6 Top Dangerous URLs Drill-Down ...........................................................................................336
9.2.7 Top Virus Sources ..................................................................................................................337
9.2.8 Top Virus Sources Drill-Down ...............................................................................................339
9.2.9 Top Virus Destinations ...........................................................................................................340
9.2.10 Top Virus Destinations Drill-Down .......................................................................................342
9.3 Intrusion Hits ...................................................................................................................................343
9.3.1 Intrusion Hits Summary .........................................................................................................343
9.3.2 Intrusion Hits Summary Drill-Down ........................................................................................344
9.3.3 Top Intrusion Hits Signatures .................................................................................................346
9.3.4 Top Intrusion Hits Signatures Drill-Down ...............................................................................349
9.3.5 Top Intrusion Hits Sources .....................................................................................................350
9.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................................353
9.3.7 Top Intrusion Hits Destinations ..............................................................................................354
9.3.8 Top Intrusion Hits Destinations Drill-Down .............................................................................356
9.3.9 Intrusion Hits Severities ........................................................................................................357
9.3.10 Intrusion Hits Severities Drill-Down ..................................................................................358
Table of Contents
Vantage Report 3.8 User’s Guide
11
Chapter 10
Security Policy Enforcement...........................................................................................................361
10.1 EPS .............................................................................................................................................361
10.1.1 What Endpoint Security Can Check ....................................................................................361
10.1.2 EPS Summary .....................................................................................................................361
10.1.3 View Logs ............................................................................................................................362
10.2 Content Filter (All) .........................................................................................................................363
10.2.1 Summary .............................................................................................................................363
10.2.2 Summary Drill-Down ............................................................................................................365
10.2.3 Top Sites ..............................................................................................................................367
10.2.4 Top Sites Drill-Down ............................................................................................................369
10.2.5 Top Users ............................................................................................................................371
10.2.6 Top Users Drill-Down ...........................................................................................................373
10.2.7 Top Hosts .............................................................................................................................374
10.2.8 Top Hosts Drill-Down ...........................................................................................................376
10.2.9 By Category .........................................................................................................................378
10.2.10 By Category Drill-Down .....................................................................................................380
10.3 Content Filter (Blocked) ................................................................................................................382
10.3.1 Summary ............................................................................................................................382
10.3.2 Summary Drill-Down ............................................................................................................383
10.3.3 Top Blocked Sites ................................................................................................................385
10.3.4 Top Blocked Sites Drill-Down ..............................................................................................387
10.3.5 Top Blocked Users ...............................................................................................................389
10.3.6 Top Blocked Users Drill-Down .............................................................................................391
10.3.7 Top Blocked Hosts ...............................................................................................................393
10.3.8 Top Blocked Hosts Drill-Down .............................................................................................395
10.3.9 Blocked Web Categories .....................................................................................................397
10.3.10 Blocked Web Categories Drill-Down ..................................................................................399
10.4 Application Access Control ...........................................................................................................401
10.4.1 Top Applications Blocked .....................................................................................................401
10.4.2 Top Users Blocked ...............................................................................................................403
10.4.3 Top Applications Allowed ...................................................................................................405
Chapter 11
Event..................................................................................................................................................407
11.1 Login ..............................................................................................................................................407
11.1.1 Successful Logins ................................................................................................................407
11.1.2 Failed Logins ........................................................................................................................408
11.2 Sessions Per Host .........................................................................................................................410
11.2.1 Top Sessions Per Host .........................................................................................................410
11.3 Top Sessions Per User ..................................................................................................................412
11.4 DHCP Leasing Summary ..............................................................................................................414
11.4.1 DHCP Leasing Summary .....................................................................................................414
Table of Contents
Vantage Report 3.8 User’s Guide
12
11.4.2 DHCP Leasing Summary Drill-Down ...................................................................................416
11.4.3 DHCP Leasing Top Hosts ....................................................................................................418
11.4.4 DHCP Leasing Top Hosts Drill-Down .................................................................................420
Chapter 12
Schedule Report...............................................................................................................................423
12.1 Scheduled Report Summary Screen .............................................................................................423
12.2 Customize Daily Report Screen ....................................................................................................424
12.3 Customize Weekly Report Screen ................................................................................................432
12.4 Customize Overtime Report Screen .............................................................................................433
12.5 Configure Template List ................................................................................................................435
12.6 Template Add/Edit .........................................................................................................................436
12.7 Logo Template ...............................................................................................................................437
12.8 Logo Template Add/Edit ...............................................................................................................438
Chapter 13
Logs...................................................................................................................................................441
13.1 Log Viewer .................................................................................................................................441
13.2 Log Receiver .................................................................................................................................444
13.2.1 By Day (Summary) ..............................................................................................................445
13.3 By Device .....................................................................................................................................447
13.3.1 Log Receiver > By Device > By Category Screen ...............................................................448
13.4 VRPT System Logs .......................................................................................................................448
13.5 Log Archiving ................................................................................................................................450
13.5.1 File Archiving Settings .........................................................................................................450
13.5.2 View Archived Files .............................................................................................................453
13.5.3 Log Transfer ........................................................................................................................455
13.6 Log Remove .................................................................................................................................456
Chapter 14
System Setting..................................................................................................................................457
14.1 General Configuration Screen .......................................................................................................457
14.1.1 Configuring for Hostname Reverse .....................................................................................458
14.2 Server Configuration Screen .........................................................................................................461
14.3 Data Maintenance Screens ...........................................................................................................463
14.3.1 Data Backup and Data Restore Screen ...............................................................................463
14.3.2 Device List Screen ...............................................................................................................464
14.3.3 Support New Models Screen ...............................................................................................464
14.4 Upgrade Screen ............................................................................................................................465
14.5 Registration Screens .....................................................................................................................466
14.5.1 Registration Summary Screen .............................................................................................467
14.5.2 Registration > Upgrade Screen ...........................................................................................468
14.6 Notification ....................................................................................................................................469
Table of Contents
Vantage Report 3.8 User’s Guide
13
14.6.1 Add/Edit a Notification .........................................................................................................470
14.7 Rule-Based Alert ...........................................................................................................................472
14.7.1 Add/Edit a Rule-based Alert ................................................................................................472
Chapter 15
User Management.............................................................................................................................481
15.1 Group Screen ................................................................................................................................481
15.1.1 Group > Add/Edit Group Screen ..........................................................................................482
15.2 Account Screen ............................................................................................................................483
15.2.1 Account > Add/Edit User Account Screen ........................................................................484
Chapter 16
Troubleshooting................................................................................................................................487
Appendix A ZyWALL Log Descriptions............................................................................................491
Appendix B Legal Information..........................................................................................................529
Index ..................................................................................................................................................531
Table of Contents
Vantage Report 3.8 User’s Guide
14
15
PART I
User’s Guide
16
Vantage Report 3.8 User’s Guide 17
CHAPTER 1
Introducing Vantage Report
Please see the Quick Start Guide for Vantage Report setup requirements, installation, and access.
This chapter introduces Vantage Report.
1.1 Introduction
Vantage Report is a cost-effective, browser-based global management solution that allows an
administrator from any location to easily manage, monitor and gather statistics on ZyXEL devices
located worldwide. With Vantage Report, you can monitor network access, enhance security, and
anticipate future bandwidth needs. A typical application is illustrated in Figure 1.
Figure 1 Typical Vantage Report Application
In this example, you use the web configurator (A) to set up the Vantage Report server (B).
You also configure the ZyXEL devices (C) to send their logs and traffic statistics to the Vantage
Report Server. The Vantage Report server collects this information. Then, you can
• monitor the whole network
• look at historical reports about network performance and events
• examine device logs
The Vantage Report server can also send statistical reports to you by e-mail.
Table 1 Supported ZyXEL Devices
VANTAGE REPORT VERSION SUPPORTED MODELS
Vantage Report 3.8 ZyWALL 110, ZyWALL 310, and ZyWALL 1100
A
.
A. Models supported at the time of writing do not support anti-spam, anti-virus, content filtering, IDP, and ADP
functions.
AC
B
Chapter 1 Introducing Vantage Report
Vantage Report 3.8 User’s Guide
18
1.2 License Versions
This is independent from the version number, 3.8 for example. When you first install Vantage
Report you get the trial version with full management authority for one device for 30 days. After the
trial version expires you have a basic version with only limited management authority for one
device.
Note: This User’s Guide discusses the features in the full version.
Purchase license keys to use the full version with full management authority for more devices. See
Section 14.5 on page 466 for more information.
1.3 Hardware Requirements
Minimum hardware requirements:
• Intel Pentium 4 processor 1 GHz
• 512 Mb RAM
• 8 GB free hard disk space
The following table shows the recommended hardware specifications. The more powerful your
computer, the more devices you can manage.
Table 2 Hardware Specification Recommendations
NUMBER OF
DEVICES
LOG HANDLING
CAPABILITY (LOGS/SEC)
CPU SPEC
(GHZ)
MEMORY
SPEC
LOG SPACE REQUIRED
(GB/DAY)
0 - 5 0 - 75 Intel P4 2.6 GHz 512 MB 0 - 1
5 - 50 75 - 750 Intel P4 2.6 GHz 1 GB 1 - 12
50 - 100 750 - 1500 Intel P4 3.2 GHz 1 GB 12 - 24
Vantage Report 3.8 User’s Guide 19
CHAPTER 2
The Vantage Report Server
This chapter explains several characteristics of the Vantage Report server.
2.1 Starting and Stopping the Vantage Report Server
Note: Make sure the port Vantage Report uses for web services is not used by other
applications, especially web servers.
The Vantage Report server runs as a service on the Vantage Report server. By default, this service
starts automatically when you log in to the Vantage Report server. You can use the services
management screen to start, stop, or configure this service. To open this screen:
1 In Windows 2000, click Start > Settings > Control Panel > Administrative Tools > Services.
The Services screen opens.
2 In Windows XP, click Start > Control Panel > Performance and Maintenance >
Administrative Tools > Services. The Services screen opens.
3 In Windows Vista or Windows 7, click Start > Control Panel > Administrative Tools >
Services. The Services screen opens.
4 Right-click on Vantage Report. A menu appears.
5 Select Start or Stop to start or stop the Vantage Report service. Select Properties to configure
the service.
Chapter 2 The Vantage Report Server
Vantage Report 3.8 User’s Guide
20
2.2 E-Mail in the Vantage Report Server
Note: Before the Vantage Report server can send e-mail to anyone, you have to configure
the SMTP mail server. See Section 14.2 on page 461 for more information.
The Vantage Report server can use e-mail to send information in several situations. In some
situations, it sends e-mail to the e-mail address that is associated with a specific user (see Section
14.3 on page 463). In other situations, it sends e-mail to any valid e-mail address.
• scheduled report - The Vantage Report server can send one or more statistical reports regularly
or one-time to any valid e-mail address. See Chapter 12 on page 423 for more information.
• system notifications - When certain system parameters cross a threshold (minimum or
maximum) value, the Vantage Report server sends e-mail to the Vantage Report administrator
(the e-mail address associated with the root account). Some of these messages are warnings; in
some situations, however, the Vantage Report server starts or stops receive logs. One of the
threshold values can be configured. See Section 14.1 on page 457.
• forgotten password - A user clicks Forget Password? in the Login screen. In this case, the
Vantage Report server sends the account information to the e-mail address associated with the
specified user name. See Section 3.2 on page 27 for an example of the Login screen.
• test message - The Vantage Report administrator tests the SMTP mail server settings. The
Vantage Report server sends an e-mail message to the e-mail address associated with the root
account. See Section 14.2 on page 461 for more information.
2.3 Time in the Vantage Report Server
• In Vantage Report, clock time is the time the Vantage Report server receives information (log
entries or traffic statistics) from the ZyXEL devices, not the time the device puts in the entry. As
soon as the Vantage Report server receives information, it replaces device times with the current
time in the Vantage Report server.
• The Vantage Report server processes log entries and traffic statistics before the information is
available in any screen (including log viewers). For performance reasons, the Vantage Report
server does not process this information right away. Instead, the processing time depends on the
way the information is used in Vantage Report. See the following table for processing times for
each menu item.
2.4 Common Terms
The following table describes the terms that appear frequently in this document.
Table 3 Processing Times by Menu Item
MENU ITEM TIME (MIN)
Monitor 5
Report (Network Traffic, Secure Remote Access, Network Security, E-Mail Security, Web
Security, Security Policy Enforcement, Authentication)
5
Logs (Log Viewer) 5
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536

ZyXEL VRPT User guide

Category
Software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI