beautypg.com

4 web, 5 mail, 6 intrusion attempts – NEXCOM IFA 1610 User Manual

Page 80: 7 connections

background image

Copyright © 2014 NEXCOM International Co., Ltd. All Rights Reserved.

IFA 3610/IFA 2610/IFA 1610 User Manual

Chapter 8: The Logs and Reports Menu

77

8.1.4 Web

The Web tab displays the number of pages that have been blocked by the URL filter engine. The summary grid is
composed by two tabs: Access report and Filter report. The former shows the blocked URL divided by Source IP Address,
URL, and Users that have been blocked, and the total count for every item, each in a table.

The latter tab shows in the first table, the following categories, that are those found in the Web filter (See Menubar

Proxy

HTTP Web Filter).

▪ General Use (Green).

▪ Parental Control (Yellow).

▪ Productivity (Blue).

▪ Security (Red).

▪ Uncategorized Sites (Dark Grey).

Like in the case of the System tab, a click on the small icon on the left-hand side of each event category causes the other
categories to not be shown, while the current is further detailed and the pie chart is updated.

The other tables at the bottom show the counts of each the blocked objects: The Source IP Addresses, the URLs, and
the Users.

8.1.5 Mail

The Mail tab displays all e-mails blocked as spam.

There is no summary grid in this tab, replaced by three tables, displaying counts for:

▪ From. The sender(s) of spam e-mails.

▪ To. The recipient(s) of spam e-mails.

▪ Source IP Address. The IP address from where spam e-mail have been sent.

8.1.6 Intrusion Attempts

The Intrusion attempts tab displays all tentative intrusions detected by the IPS (See Menubar

Services Intrusion

Prevention).

The tables at the bottom show counts of the following information:

▪ Intrusion attempts. The categories under which falls each attempt.

▪ Source IP Address. The IP address from where the attack originated.

▪ Destination IP Address. The IP Address to which the attack was launched.

8.1.7 Connections

The Connections tab displays the average number of connections started by the users of the appliance, grouped into:

▪ Local connections. Accesses via SSH or console.

▪ Hotspot users. Users accessing the Hotspot.

▪ IPsec users. Clients connected via IPsec.

▪ OpenVPN users. clients connected using VPN.

This manual is related to the following products: