- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
24-Attack defense statistics | 19.66 KB |
Attack defense statistics
Introduction
Attack defense statistics
The attack defense statistics page displays the following attack defense statistics: attack types, attack times, and the number of dropped packets caused by each attack.
Client verification statistics
The client verification statistics page displays the following statistics for IP entries protected by client verification:
· Client verification type.
· VRF to which the protected IP belongs.
· Protected IP address.
· Port.
· Type of the protected IP address.
· Number of packets destined for the protected IP address.
· Number of request packets that passed client verification.
Blacklist statistics
The blacklist statistics page displays the following blacklist entry statistics:
· VRF.
· IP address added to the blacklist entry.
· DS-Lite tunnel peer address.
· Type of the blacklist entry.
· Remaining aging time of the blacklist entry.
· Number of dropped packets that match the blacklist entry.