02-Monitor

HomeSupportConfigure & DeployH3C Firewall Products Comware 7 Web Configuration Guide-6W40202-Monitor
15-Scanning attack logs
Title Size Download
15-Scanning attack logs 12.38 KB

Scanning attack logs

Introduction

If logging is enabled for scanning attack events, the device outputs a log when a scanning attack is detected.

If IP sweep and port scan attacks reach the scanning thresholds at the same time, the device output a log only for the IP sweep attack.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网