I'll check and see if I can gather some reports that contain data and then I'll get back to you.
Are you aware of the reports that are available? Here's a summary of the available reports:
•Device Utilization: Percent utilization of the CPU, compact flash, and RAM on the ISA500 Security Appliance, presented in graph and table formats.
•Network Usage: Network usage in bytes and packets by protocol: HTTP, HTTPS, Email, SSH, and FTP, presented in graph and table formats.
•Bandwidth Summary: Graphical and tabular format report of inbound and outbound traffic in bytes, by type. When CSV is selected as the report format, the following additional data is provided: number of dropped packets (in), dropped packets (out), error packets (in), and error packets (out).
•Device Logins: ISA500 Security Appliance administrator logins, user account logins, and failed logins.
•WiFi Report: Reports WiFi usage. The duration column for an entry is empty if the VPN user is connected when the report is generated.
•VPN Report: IPSec and SSL VPN login tracking. The duration column for an entry is empty if the VPN user is connected when the report is generated.
•Firewall Attacks: Displays summary and detail information for firewall attack events detected by the Firewall Attack Protection Security Service on the ISA500 security appliance.
•Web Usage: Displays summary and detail information for Web usage by category, top visited sites, top users, and blocked sites.
•Web Threats: Displays summary and detail information for Web threats detected by the Web Reputation Filtering service or Security Policy Profile configured on the ISA500 appliance.
•Virus Attacks: Displays summary and detail information for virus attack events detected by the ISA500 Anti-Virus Security Service.
•Spam Filter: Displays summary and details for emails blocked by the Spam Filter service on the ISA500. An email is classified as spam if the sender's reputation is below the SPAM threshold configured on the ISA500.
•IPS Threats: Displays summary and detail information about security threats blocked by the Intrusion Prevention System (IPS) on the ISA500. When CSV is selected as the report format, additional data is provided (for example, the source IP address of the blocked threat).
•Custom: A Custom Security report can be generated by choosing sections from any of the Security reports listed in this section when generating the report.
SG350-28MP configured in either power limit class or portAttaching a device which requires 25W. At first boot, SG350 identifies the device as PoE Class 4 and sets the port statically to 25.5W . Device negotiates via 802.3 to 25.0W power consumption as PD....
I recently purchased an RV160W for an individual who was having substantial trouble with her ISP router. Unfortunately, I received the wrong model in the mail, the RV160. Is there a low cost solution anyone is aware of to attach a wireless acces...
Hey Everybody, Corey here with another issue of our newsletter. Where you can keep up with the latest from our community and support teams.
We’re hard at work making documentation for Cisco Business Switches and the Cisco Business Dashb...
I have enabled ssh on RV340 via downloading the configuration and setting ssh from false to true then uploading back to the router When I try to ssh i m able to connect and enter credentials but unfortunately getting the following error &nb...