
List of Figures
Vantage Report User’s Guide
18
Figure 39 Traffic > WEB > Top Hosts > Drill-Down ...............................................................................100
Figure 40 Traffic > WEB > Top Users ................................................................................................... 101
Figure 41 Traffic > WEB > Top Users > Drill-Down .............................................................................. 103
Figure 42 Traffic > FTP > Top Sites ...................................................................................................... 105
Figure 43 Traffic > FTP > Top Sites > Drill-Down ................................................................................. 107
Figure 44 Traffic > FTP > Top Hosts ..................................................................................................... 108
Figure 45 Traffic > FTP > Top Hosts > Drill-Down .................................................................................110
Figure 46 Traffic > FTP > Top Users .....................................................................................................112
Figure 47 Traffic > FTP > Top Users > Drill-Down .................................................................................114
Figure 48 Traffic > MAIL > Top Sites .....................................................................................................116
Figure 49 Traffic > MAIL > Top Sites > Drill-Down .................................................................................118
Figure 50 Traffic > MAIL > Top Hosts ....................................................................................................119
Figure 51 Traffic > MAIL > Top Hosts > Drill-Down ..............................................................................121
Figure 52 Traffic > MAIL > Top Users ................................................................................................... 123
Figure 53 Traffic > MAIL > Top Users > Drill-Down ..............................................................................125
Figure 54 Traffic > Customization > Customization (Platform Selection) ............................................. 126
Figure 55 Traffic > Customization > Customization (Service Settings) ................................................ 127
Figure 56 Traffic > Customization > Top Destinations .......................................................................... 128
Figure 57 Traffic > Customization > Top Destinations > Drill-Down ..................................................... 130
Figure 58 Traffic > Customization > Top Sources ................................................................................. 131
Figure 59 Traffic > Customization > Top Sources > Drill-Down ............................................................ 133
Figure 60 Traffic > Customization > Top Users .................................................................................... 134
Figure 61 Traffic > Customization > Top Users > Drill-Down ................................................................ 136
Figure 62 VPN > Site-to-Site > Link Status .......................................................................................... 139
Figure 63 VPN > Site-to-Site > Traffic Monitor ..................................................................................... 140
Figure 64 VPN > Site-to-Site > Top Peer Gateways ............................................................................. 142
Figure 65 VPN > Site-to-Site > Top Peer Gateways > Drill-Down ........................................................ 144
Figure 66 VPN > Site-to-Site > Top Sites ............................................................................................. 145
Figure 67 VPN > Site-to-Site > Top Sites > Drill-Down ......................................................................... 147
Figure 68 VPN > Site-to-Site > Top Tunnels ......................................................................................... 149
Figure 69 VPN > Site-to-Site > Top Tunnels > Drill-Down .................................................................... 151
Figure 70 VPN > Site-to-Site > Top Protocols ...................................................................................... 152
Figure 71 VPN > Site-to-Site > Top Protocols > Drill-Down .................................................................. 155
Figure 72 VPN > Site-to-Site > Top Hosts ............................................................................................ 156
Figure 73 VPN > Site-to-Site > Top Hosts > Drill-Down ....................................................................... 159
Figure 74 VPN > Site-to-Site > Top Users ............................................................................................ 161
Figure 75 VPN > Site-to-Site > Top Users > Drill-Down ....................................................................... 163
Figure 76 VPN > Site-to-Site > Top Destinations ................................................................................. 165
Figure 77 VPN > Site-to-Site > Top Destinations > Drill-Down ............................................................. 167
Figure 78 VPN > Remote Access > Total Users And Traffic ................................................................ 169
Figure 79 VPN > Remote Access > User Status .................................................................................. 170
Figure 80 VPN > Remote Access > Top Protocols .............................................................................. 171
Figure 81 VPN > Remote Access > Top Protocols > Drill-Down ......................................................... 173