4 web, 5 mail, 6 intrusion attempts – NEXCOM IFA 1610 User Manual
Page 80: 7 connections
Copyright © 2014 NEXCOM International Co., Ltd. All Rights Reserved.
IFA 3610/IFA 2610/IFA 1610 User Manual
Chapter 8: The Logs and Reports Menu
77
8.1.4 Web
The Web tab displays the number of pages that have been blocked by the URL filter engine. The summary grid is
composed by two tabs: Access report and Filter report. The former shows the blocked URL divided by Source IP Address,
URL, and Users that have been blocked, and the total count for every item, each in a table.
The latter tab shows in the first table, the following categories, that are those found in the Web filter (See Menubar
►
Proxy
► HTTP ► Web Filter).
▪ General Use (Green).
▪ Parental Control (Yellow).
▪ Productivity (Blue).
▪ Security (Red).
▪ Uncategorized Sites (Dark Grey).
Like in the case of the System tab, a click on the small icon on the left-hand side of each event category causes the other
categories to not be shown, while the current is further detailed and the pie chart is updated.
The other tables at the bottom show the counts of each the blocked objects: The Source IP Addresses, the URLs, and
the Users.
8.1.5 Mail
The Mail tab displays all e-mails blocked as spam.
There is no summary grid in this tab, replaced by three tables, displaying counts for:
▪ From. The sender(s) of spam e-mails.
▪ To. The recipient(s) of spam e-mails.
▪ Source IP Address. The IP address from where spam e-mail have been sent.
8.1.6 Intrusion Attempts
The Intrusion attempts tab displays all tentative intrusions detected by the IPS (See Menubar
► Services ► Intrusion
Prevention).
The tables at the bottom show counts of the following information:
▪ Intrusion attempts. The categories under which falls each attempt.
▪ Source IP Address. The IP address from where the attack originated.
▪ Destination IP Address. The IP Address to which the attack was launched.
8.1.7 Connections
The Connections tab displays the average number of connections started by the users of the appliance, grouped into:
▪ Local connections. Accesses via SSH or console.
▪ Hotspot users. Users accessing the Hotspot.
▪ IPsec users. Clients connected via IPsec.
▪ OpenVPN users. clients connected using VPN.