Label | DESCRIPTION |
---|---|
DNS Threat Filter Scanned (Connection Amount) | This chart displays the total number of connections detected by the Zyxel Device. Move your cursor over a trend line to display the number of connections encountered over time. |
DNS Threat Filter Trend (Hits) | This chart displays the number of URLs of FQDNs that may pose a security threat to network devices that were scanned. Move your cursor over a trend line to display the number of URLs of FQDNs encountered over time. |
Top Source Hostname | This chart displays the three most common source hostnames of the incoming malicious or suspicious files. Scroll down to DNS Filter Hit Detail and click the by Hostname tab to display details about the source hostnames. |
Top Source MAC Address | This chart displays the three most common source MAC addresses of the incoming malicious or suspicious files. Scroll down to DNS Filter Hit Detail and click the by MAC Address tab to display details about the source MAC addresses. |
Top Threat Domain | This chart displays the three most common URLs of FQDNs that may pose a security threat to network devices behind the Zyxel Device. Scroll down to DNS Filter Hit Detail and click the by DNS Filter Domain tab to display details about the URLs of FQDNs. |
Top Threat Category | This chart displays the three most common categories of FQDNs that may pose a security threat to network devices behind the Zyxel Device. Scroll down to DNS Filter Hit Detail and click the by Threat Category tab to display details about the categories of FQDNs. |
Top Source IP | This chart displays the three most common source IP addresses of the incoming malicious and/or suspicious files. Scroll down to DNS Filter Hit Detail and click the by Source IP tab to display details about the source IP addresses. |
Top Query Type | This chart displays the three most commaon types of DNS (Domain Name System) record of the security threat to network devices behind the Zyxel Device. Scroll down to DNS Filter Hit Detail and click the by Query Type tab to display details about the DNS (Domain Name System) record type. |
DNS Threat Filter Hit Detail | This displays the number of malicious or suspicious packets detected by the Zyxel Device, categorized by hostname, MAC address, threat domain, threat category, source IP address, and destination IP address. See Add or Remove a Threat Domain to the Allow List for more information on how to add or remove a threat domain from the allow list. |
Label | DESCRIPTION |
---|---|
URL Threat Filter Scanned (Website Amount) | This chart displays the total number of connections detected by the Zyxel Device. Move your cursor over a trend line to display the number of connections encountered over time. |
URL Threat Filter Trend (Hits) | This chart displays the number of threats posed by websites detected by the Zyxel Devices. Move your cursor over a trend line to display the number of threats encountered over time. |
Top Source Hostname | This chart displays the three most common source hostnames of the incoming malicious or suspicious files. Scroll down to DNS Filter Hit Detail and click the by Hostname tab to display details about the source hostnames. |
Top Source MAC Address | This chart displays the three most common source MAC addresses of the incoming malicious or suspicious files. Scroll down to DNS Filter Hit Detail and click the by MAC Address tab to display details about the source MAC addresses. |
Top Threat Website | This chart displays the top three threat websites detected by the Zyxel Device. Scroll down to URL Threat Filter Hit Detail and click the by Threat Website tab to display details about the specific websites that were detected. |
Top Type | This chart displays the top three most common types of threats posed by websites detected by the Zyxel Devices. Threat categories include Spam URL, Malicious Sites/Botnet, Black List, Anonymizers, Spyware Adware Keylogger, Browser Exploits, and Phishing. Scroll down to URL Threat Filter Hit Detail and click the by Type tab to display details about the threats posed by websites that were detected. ![]() |
Top Source IP | This chart displays the source IP addresses of the three most common incoming threat websites. Scroll down to URL Threat Filter Hit Detail and click the by Source IP tab to display details about the source IP addresses of the incoming threat websites that were detected. |
Top Destination IP | This chart displays the destination IP addresses of the three most common incoming threat websites. Scroll down to URL Threat Filter Hit Detail and click the by Destination IP tab to display details about the destination IP addresses of the incoming threat websites that were detected. |
URL Threat Filter Hit Detail | This displays the number of threat websites detected by the Zyxel Device, categorized by hostname, MAC address, threat website, threat type, source IP address, or destination IP address. See Add or Remove a Threat Website to the Allow List for more information on how to add or remove a domain from the allow list. |
Label | DESCRIPTION |
---|---|
Antivirus / Malware Scanned (File Amount) | This chart displays the total number of connections detected by the Zyxel Device. Move your cursor over a trend line to display the number of connections encountered over time. |
Antivirus/Malware Trend (Hits) | This chart displays patterns in threats by the number of virus or malware attacks detected by the Zyxel Device. Move your cursor over a trend line to display the number of threats encountered over time. |
Top Source Hostname | This chart displays the three most common source hostnames of virus or malware attacks detected by the Zyxel Device. Scroll down to DNS Filter Hit Detail and click the by Hostname tab to display details about the source hostnames. |
Top Source MAC Address | This chart displays the three most common source MAC addresses of virus or malware attacks detected by the Zyxel Device. Scroll down to DNS Filter Hit Detail and click the by MAC Address tab to display details about the source MAC addresses. |
Top Virus / Malware | This chart displays the three most common malware and viruses detected by the Zyxel Device. Scroll down to Antivirus / Malware Hit Detail and click the by Virus / Malware tab to display details about the malware and viruses that were detected. |
Top Source IP | This chart displays the source IP addresses of the three most common malware and viruses detected by the Zyxel Device. Scroll down to Antivirus / Malware Hit Detail and click the by Source IP tab to display details about the source IP addresses of the incoming malicious and/or suspicious files. |
Top Destination IP | This chart displays the destination IP addresses of the three most common malware and viruses detected by the Zyxel Device. Scroll down to Antivirus / Malware Hit Detail and click the by Destination IP tab to display details about the destination IP addresses of the incoming malicious and/or suspicious files. |
Antivirus / Malware Hit Detail | This displays the number of antivirus and malware detected by the Zyxel Device, categorized by hostname, MAC address, virus and malware, source IP address, or destination IP address. |
Label | DESCRIPTION |
---|---|
Sandboxing Scanned (File Amount) | This chart displays the total number of connections detected by the Zyxel Device. Move your cursor over a trend line to display the number of connections encountered over time. |
Sandboxing Trend (Hits) | This chart displays the number of malicious and/or suspicious files that were scanned. Move your cursor over a trend line to display the number of malicious and/or suspicious files encountered over time. |
Top File Type | This chart displays the three most common types of malicious and/or suspicious files. Scroll down to Sandboxing Hit Detail and click the by File Type tab to display details about the malicious and/or suspicious file types. |
Top File Name | This chart displays the file names of the three most common incoming malicious and/or suspicious files. Scroll down to Sandboxing Hit Detail and click the by File Name tab to display details about the file names of the incoming malicious and/or suspicious files. |
Top File Hash | This chart displays the hash values of the three most common incoming malicious and/or suspicious files. Scroll down to Sandboxing Hit Detail and click the by File Hash tab to display details about the hash values of the incoming malicious and/or suspicious files. |
Top User | This chart displays the three users who receive malicious and/or suspicious files the most. Scroll down to Sandboxing Hit Detail and click the by User tab to display details about the users that are at risk of malicious and/or suspicious files. |
Top Source IP | This chart displays the source IP addresses of the three most common incoming malicious and/or suspicious files. Scroll down to Sandboxing Hit Detail and click the by Source IP tab to display details about the source IP addresses of incoming malicious and/or suspicious files. |
Top Destination IP | This chart displays the three destination IP addresses that receive the most incoming malicious and/or suspicious files. Scroll down to Sandboxing Hit Detail and click the by Destination IP tab to display details about the destination IP addresses of incoming malicious and/or suspicious files. |
Sandboxing Hit Detail | This displays the number of malicious and/or suspicious files detected by the Zyxel Device, categorized by hostname, MAC address, file type, file name, file hash, user, source IP address, or destination IP address. |
Label | DESCRIPTION |
---|---|
Mail Protection Scanned (Mail Amount) | This chart displays the total number of mails detected by the Zyxel Device. Move your cursor over a trend line to display the number of mails sent and received over time. |
Mail Protection Trend (Hits) | This chart displays the number of spam mails detected by the Zyxel Device. Move your cursor over a trend line to display the number of threats encountered over time. |
Top Source Hostname | This chart displays the three most common spam email sender hostnames detected by the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by Hostname tab to display details about the spam email sender hostnames that were detected. |
Top Source MAC Address | This chart displays the three most common spam email sender MAC addresses detected by the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by MAC Address tab to display details about the spam email sender MAC addresses that were detected. |
Top Spam Email Subject | This chart displays the three most common spam email subjects detected by the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by Email Subject tab to display details about the spam email subjects that were detected. |
Top Spam Sender Email | This chart displays the three most common spam email senders detected by the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by Sender Email tab to display details about the spam email senders that were detected. |
Top Spam Received IP | This chart displays the three most common traffic classified as spam received by the internal users of the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by Received IP tab to display details about the spam email recipients that were detected. |
Top Spam Sender IP | This chart displays the three most common traffic classified as spam sent from the internal users of the Zyxel Device. Scroll down to Email Spam Hit Detail and click the by Sender IP tab to display details about the spam traffic source that were detected. |
Mail Protection Hit Detail | This displays the information of spam mails detected by the Zyxel Device, categorized by hostname, MAC address, email subject, sender email, sender IP address, or received IP address. |
Label | DESCRIPTION |
---|---|
DNS Content Filter Scanned (Connection Amount) | This chart displays the total number of connections detected by the Zyxel Device. Move your cursor over a trend line to display the number of connections encountered over time. |
Blocked Domain Access Trend (Hits) | This chart displays the number of accesses to blocked domains that were scanned. Move your cursor over a trend line to display the number of accesses to blocked domains encountered over time. |
Allowed Domain Access Trend (Hits) | This chart displays the number of accesses to allowed domains that were scanned. Move your cursor over a trend line to display the number of accesses to allowed domains encountered over time. |
Top Accessed Blocked Domain | This chart displays the three most commonly accessed blocked domains. Scroll down to Blocked Domain Access History and click the by Domain tab to display details about the accesses to blocked domains that were scanned. |
Top Accessed Blocked Category | This chart displays the three most common categories of blocked domains accessed. Scroll down to Blocked Domain Access History and click the by Category tab to display details about the accesses to blocked domains that were scanned. |
Top Accessed Allowed Domain | This chart displays the three most commonly accessed allowed domains. Scroll down to Allowed Domain Access History and click the by Domain tab to display details about the accesses to allowed domains that were scanned. |
Top Accessed Allowed Category | This chart displays the three most common categories of allowed domains accessed. Scroll down to Allowed Domain Access History and click the by Category tab to display details about the accesses to allowed domains that were scanned. |
Top Source IP (To Blocked Domain) | This chart displays the source IP addresses of the three most commonly accessed blocked domains. Scroll down to Blocked Domain Access History and click the by Source IP tab to display details about the source IP addresses of the blocked domains. |
Top Accessed Blocked Query Type | This chart displays the three most common DNS record types for accessed domains that were blocked. Scroll down to Blocked Domain Access History and click the by Query Type tab to display details about the DNS record types of the blocked domains. |
Top Source IP (To Allowed Domain) | This chart displays the source IP addresses of the three most commonly accessed allowed domains. Scroll down to Allowed Domain Access History and click the by Source IP tab to display details about the source IP addresses of the allowed domains. |
Top Accessed Allowed Query Type | This chart displays the three most common DNS record types for accessed domains that were allowed. Scroll down to Allowed Domain Access History and click the by Query Type tab to display details about the DNS record types of the allowed domains. |
Blocked Domain Access History | This displays the domains that are blocked by the Zyxel Device, categorized by domain name, category, source IP address, and DNS record types. |
Allowed Domain Access History | This displays the domains that are allowed by the Zyxel Device, categorized by domain name, category, source IP address, and DNS record types. |
Label | DESCRIPTION |
---|---|
Blocked Application Access Trend (Hits) | This chart displays the most commonly used applications accessed through the Zyxel Device as detected and blocked by Application Patrol. Move your cursor over a trend line to display the number of threats encountered over time. |
Allowed Application Access Trend (Hits) | This chart displays the number of most frequently visited applications through the Zyxel Device as detected by Application Patrol. Application Patrol manages general protocols (for example, HTTP and FTP, instant messenger (IM), peer-to-peer (P2P), Voice over IP (VoIP), streaming (RSTP) applications and even an application’s individual features (like text messaging, voice, video conferencing, and file transfers). Move your cursor over a trend line to display the number of threats encountered over time. |
Top Accessed Blocked Application | This chart displays the three applications that were blocked the most frequently by the Zyxel Device. Scroll down to Blocked Application Access History and click the Application Name tab to display details about the specific applications that were blocked. |
Top Accessed Blocked Application Type | This chart displays the three types of application that were blocked the most frequently by the Zyxel Device. Scroll down to Blocked Application Access History and click the Application Type tab to display details about the specific application types that were blocked. |
Top Access Allowed Application | This chart displays the three applications that were accessed the most frequently by the Zyxel Device. Scroll down to Allowed Application Access History and click the Application Name tab to display details about the specific applications that were accessed. |
Top Access Allowed Application Type | This chart displays the three applications that were accessed the most frequently by the Zyxel Device. Scroll down to Allowed Application Access History and click the Application Type tab to display details about the specific application types that were accessed. |
Blocked Application Access History | This displays the applications that are blocked by the Zyxel Device, categorized by application and application type. |
Allowed Application Access History | This displays the applications that are allowed by the Zyxel Device, categorized by application and application type. |
Label | DESCRIPTION |
---|---|
Website Scanned (Website Amount) | This chart displays the total number of websites detected by the Zyxel Device. Move your cursor over a trend line to display the number of websites encountered over time. |
Blocked Website Access Trend (Hits) | This chart displays the number of accesses to blocked websites that were scanned. Move your cursor over a trend line to display the number of accesses to blocked websites encountered over time. |
Allowed Website Access Trend (Hits) | This chart displays the number of accesses to allowed websites that were scanned. Move your cursor over a trend line to display the number of accesses to allowed websites encountered over time. |
Top Accessed Blocked Website | This chart displays the three most commonly accessed blocked websites. Scroll down to Blocked Website Access History and click the by Website tab to display details about the accesses to blocked websites that were scanned. |
Top Accessed Blocked Website Type | This chart displays the three most common types of blocked websites accessed. Scroll down to Blocked Website Access History and click the by Website Type tab to display details about the types of blocked websites that were scanned. |
Top Accessed Allowed Website | This chart displays the three most commonly accessed allowed websites. Scroll down to Allowed Website Access History and click the by Website tab to display details about the accesses to blocked websites that were scanned. |
Top Accessed Allowed Website Type | This chart displays the three most common types of allowed websites accessed. Scroll down to Allowed Website Access History and click the by Website Type tab to display details about the types of allowed websites that were scanned. |
Top Source IP (To Blocked Website) | This chart displays the source IP addresses of the three most commonly accessed blocked websites. Scroll down to Allowed Website Access History and click the by Source IP tab to display details about the source IP addresses of the blocked websites. |
Top Destination IP (To Blocked Website) | This chart displays the destination IP addresses of the three most commonly accessed blocked websites. Scroll down to Blocked Website Access History and click the by Destination IP tab to display details about the destination IP addresses of the blocked websites. |
Top Source IP (To Allowed Website) | This chart displays the source IP addresses of the three most commonly accessed allowed websites. Scroll down to Allowed Website Access History and click the by Source IP tab to display details about the source IP addresses of the allowed websites. |
Top Destination IP (To Allowed Website) | This chart displays the destination IP addresses of the three most commonly accessed allowed websites. Scroll down to Allowed Website Access History and click the by Destination IP tab to display details about the destination IP addresses of the allowed websites. |
Blocked Website Access History | This displays the blocked websites accessed the most frequently as detected by the Zyxel Device, categorized by website, website type, source IP address, and destination IP address. |
Allowed Website Access History | This displays the allowed websites accessed the most frequently as detected by the Zyxel Device, categorized by website, website type, source IP address, and destination IP address. |
Label | DESCRIPTION |
---|---|
Top Source Hostname | This chart displays the three hostnames with the greatest bandwidth usage on the network. Scroll down to Traffic Detail and click the by Hostname tab to display details about the hostnames that send the most traffic. |
Top Source MAC Address | This chart displays the three MAC addresses with the greatest bandwidth usage on the network. Scroll down to Traffic Detail and click the by MAC Address tab to display details about the MAC addresses that send the most traffic. |
Top Bandwidth User | This displays the top three users of bandwidth on the network. Scroll down to Traffic Detail and click the by User tab to display details about the users that use the most bandwidth on the network. |
Top Application Usage | This displays the network applications with the greatest bandwidth usage on the network. Scroll down to Traffic Detail and click the by Application tab to display details about the applications that use the most bandwidth on the network. |
Top Destination Country | This displays the top three countries that received the most data traffic from the Zyxel Device. Scroll down to Traffic Detail and click the by Destination Country tab to display details about the countries that received the most bandwidth on the network. |
Top Destination Port | This displays the top three destination ports by bandwidth usage over a This displays the network applications with the greatest bandwidth usage. Scroll down to Traffic Detail and click the by Destination Port tab to display details about the ports that received the most bandwidth on the network. |
Traffic Detail | This displays the information of the traffic passing through the Zyxel Device, categorized by hostname, MAC address, user, application, destination country, and destination port. |
Label | DESCRIPTION |
---|---|
CPU Usage Trend | This field displays the current CPU utilization percentage used on the Zyxel Device. |
Memory Usage Trend | This field displays the percentage of current DRAM memory utilization used on the Zyxel Device. |
Session Usage Trend | This field displays the number of concurrent NAT/security policies traffic sessions the Zyxel Device is using. |
Device Information | |
Device Name | This field displays the device name of the Zyxel Device. |
Model Name | This field displays the model name of the Zyxel Device. |
MAC Address | This field displays the MAC address of the Zyxel Device. |
Serial Number | This field displays the serial number of the Zyxel Device. |
Firmware Version | This field displays the firmware version of the Zyxel Device. |
WAN IP Address | This field displays the IP address of the Zyxel Device on the network. |
License Information | |
License Name | This field displays the name of the license that is linked to the Zyxel Device. |
License Status | This field displays the remaining valid days of the service’s license. |
Label | DESCRIPTION |
---|---|
DMZ Traffic Usage Trend | This chart displays the amount of data that is transmitted on the DMZ interface over time. |
LAN1 Traffic Usage Trend | This chart displays the amount of data that is transmitted on the LAN1 interface over time. |
LAN2 Traffic Usage Trend | This chart displays the amount of data that is transmitted on the LAN2 interface over time. |
OPT Traffic Usage Trend | This chart displays the amount of data that is transmitted on the OPT interface over time. |
RESERVED Traffic Usage Trend | This chart displays the amount of data that is transmitted on the RESERVED interface over time. |
WAN1 Traffic Usage Trend | This chart displays the amount of data that is transmitted on the WAN1 interface over time. |
WAN2 Traffic Usage Trend | This chart displays the amount of data that is transmitted on the WAN2 interface over time. |