- Table of Contents
-
- 02-Monitor
- 01-Attack defense statistics
- 02-Application audit logs
- 03-Blacklist logs
- 04-File filtering logs
- 05-TopN file filtering statistics
- 06-TopN file filtering trends
- 07-Flood attack logs
- 08-DNS cache information
- 09-Transparent DNS proxy statistics
- 10-Link load balancing statistics
- 11-Server load balancing statistics
- 12-URL visit trends
- 13-Operation logs
- 14-Report settings
- 15-Scanning attack logs
- 16-Session list
- 17-Single-packet attack logs
- 18-System logs
- 19-Threat logs
- 20-TopN threats
- 21-TopN threat trends
- 22-Traffic logs
- 23-TopN traffic
- 24-TopN traffic trends
- 25-URL filtering logs
- 26-TopN URL filtering statistics
- 27-TopN URL filtering trends
- 28-User information center
- 29-Security policy log
- 30-IPv4 online users
- 31-IPv6 online users
- 32-Load balancing logging
- 33-LB session information
- 34-MAC authentication online users
- Related Documents
-
Title | Size | Download |
---|---|---|
01-Attack defense statistics | 19.91 KB |
Attack defense statistics
Introduction
Attack defense statistics
The attack defense statistics page displays the following attack defense statistics: attack types, attack times, and the number of dropped packets caused by each attack.
Client verification statistics
The client verification statistics page displays the following statistics for IP entries protected by client verification:
· Client verification type.
· VRF to which the protected IP belongs.
· Protected IP address.
· Port.
· Type of the protected IP address.
· Number of packets destined for the protected IP address.
· Number of request packets that passed client verification.
Blacklist statistics
The blacklist statistics page displays the following blacklist entry statistics:
· VRF.
· IP address added to the blacklist entry.
· DS-Lite tunnel peer address.
· Type of the blacklist entry.
· Remaining aging time of the blacklist entry.
· Number of dropped packets that match the blacklist entry.