Attack Reports - Firewall Reports


 The Attack Reports section includes reports that show details of attacks that have been identified by the firewall. These reports help in identifying the top attackers, the top targets for the attacks and other details like protocol used, the priority of the attack and the status of the attack.

How to export report in PDF, CSV, XLS formats, on demand?

 The Top Attackers report shows the top source IP addresses or host names from which attacks are originating, along with the protocol used for the attack and the number of hits. The Top Targets report shows the top destination IP addresses or host names that have been attacked, along with the protocol used for the attack and the number of hits.

Drill down from these graphs to see the following details:

FieldDescription
AttackThe name or id (as defined by the firewall) of the attack that was sent or received
Destination/ HostThe destination host or IP address to which the attack was sent/
The host or IP address that sent the attack
SeverityThe severity level of the attack, as defined by the firewall
HitsThe number of times the attack was sent to or received by the same host
SubtypeThe subtype of the attack, as defined by the firewall
StatusThe status of the attack that was sent or received

 The Top Protocols Used By Attacks report shows the top protocols used by each attack.

The Top Attacks By Priority report shows the top attacks classified based on priority like Alert, Emergency etc.

Drill down from these graphs to see the following details:

FieldDescription
HostThe host or IP address that sent the attack
DestinationThe destination host or IP address to which the attack was sent
Severity/ ProtocolThe severity level of the attack, as defined by the firewall/
The protocol used to send the attack
HitsThe number of times the attack was sent to or received by the same host
SubtypeThe subtype of the attack, as defined by the firewall
StatusThe status of the attack that was sent or received

 The Top Attacks with Status report shows the status of the Top Attacks (ID or names) based on the number of hits. Drill down from this graph to see the following details:

FieldDescription
AttackThe name or id (as defined by the firewall) of the attack that was sent or received
HostThe host or IP address that sent the attack file
DestinationThe destination host or IP address to which the attack file was sent
ProtocolThe protocol used by the attack to send this attack file
SeverityThe severity level of the attack, as defined by the firewall
HitsThe number of times the attack file was sent to the same host
SubtypeThe subtype of the attack, as defined by the firewall
StatusThe status of the attack that was sent or received

 The Top Attacker by unique targets report shows peer to peer attack details. The report lists the hosts from which attacks are originating along with number of unique/distinct destinations (hosts) targeted. Drill down from this graph to see the following details:

FieldDescription
DestinationThe destination host or IP address to which the attack file was sent
AttackThe name or id (as defined by the firewall) of the attack that was sent or received
ProtocolThe protocol used by the attack to send this attack file
StatusThe status of the attack that was sent or received
CountNo. of times the attack file was sent to the destination.

  

Thank you for your feedback!

Was this content helpful?

We are sorry. Help us improve this page.

How can we improve this page?
Do you need assistance with this topic?
By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
A single platter for comprehensive Network Security Device Management