03-Monitor

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath M9000 Comware 7 Web configuration guide(R9153P38 R9724P38 R9001P38 E9153P38)-6W40103-Monitor
02-Single-packet attack logs
Title Size Download
02-Single-packet attack logs 18.45 KB

Single-packet attack logs

Introduction

If logging is enabled for single-packet attack events, the device outputs a log when a packet with a specific signature is detected.

By default, log aggregation for single-packet attack events is enabled. The device aggregates multiple logs generated during a period of time and outputs one log. Logs that are aggregated must have the following attributes in common:

·     Security zone where the attacks are detected.

·     Attack type.

·     Attack prevention action.

·     Source and destination IP addresses.

·     VPN instance (VRF) to which the victim IP address belongs.

You can disable log aggregation for single-packet attack events on the System > Log Settings > Attack Defense Log Settings page. As a best practice, do not disable log aggregation if single-packet attacks frequently occur. A large number of logs will consume the display resources.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网