- Table of Contents
-
- 04-Policies
- 01-Security policy
- 02-Security policy redundancy analysis
- 03-Security policy hit analysis
- 04-Security policy optimization
- 05-Attack defense
- 06-Risk analysis
- 07-Blacklist
- 08-Connection limit
- 09-uRPF
- 10-IPCAR
- 11-IP reputation
- 12-Domain reputation
- 13-Application audit
- 14-Bandwidth management
- 15-Server connection detection
- 16-Application proxy
- Related Documents
-
Title | Size | Download |
---|---|---|
06-Risk analysis | 21.76 KB |
Risk analysis
This help contains the following topics:
Introduction
This feature scans devices in an IPv4 or IPv6 address range to find whether specific TCP or UDP ports are opened on these devices. You can enhance the device security based on the scan result.
Configure risk analysis
1. Click the Policies tab.
2. In the navigation pane, select Attack Defense > Risk Analysis.
3. Select an address type. Options are IPv4 and IPv6.
4. Configure an IP address range.
5. Select or enter TCP port numbers.
6. Select or enter UDP port numbers.
7. Click Scan.
During the scanning progress, you can minimize the scanning progress window and perform operations on other pages.
8. Click OK when the device finishes the scan task.
To access the risk analysis page from other pages, select Go to the risk analysis page on the scanning progress window, and then click OK.
9. To view risk analysis results, select one or more entries in the Scanning records area, and then click Search.