- Table of Contents
-
- 03-Monitor
- 01-Blacklist logs
- 02-Single-packet attack logs
- 03-Scanning attack logs
- 04-Flood attack logs
- 05-Threat logs
- 06-URL filtering logs
- 07-File filtering logs
- 08-Security policy log
- 09-Application audit logs
- 10-System logs
- 11-Operation logs
- 12-Traffic logs
- 13-TopN traffic
- 14-TopN threats
- 15-TopN URL filtering statistics
- 16-TopN file filtering statistics
- 17-Attack defense statistics
- 18-Server load balancing statistics
- 19-Link load balancing statistics
- 20-Transparent DNS proxy statistics
- 21-TopN traffic trends
- 22-TopN threat trends
- 23-TopN URL filtering trends
- 24-TopN file filtering trends
- 25-URL visit trends
- 26-Report settings
- 27-Session list
- 28-LB session information
- 29-User information center
- 30-DNS cache information
- 31-IPv4 online users
- 32-IPv6 online users
- 33-MAC authentication online users
- 34-Load balancing logging
- Related Documents
-
Title | Size | Download |
---|---|---|
17-Attack defense statistics | 19.99 KB |
Attack defense statistics
Introduction
Attack defense statistics
The attack defense statistics page displays the following attack defense statistics: attack types, attack times, and the number of dropped packets caused by each attack.
Client verification statistics
The client verification statistics page displays the following statistics for IP entries protected by client verification:
· Client verification type.
· VRF to which the protected IP belongs.
· Protected IP address.
· Port.
· Type of the protected IP address.
· Number of packets destined for the protected IP address.
· Number of request packets that passed client verification.
Blacklist statistics
The blacklist statistics page displays the following blacklist entry statistics:
· VRF.
· IP address added to the blacklist entry.
· DS-Lite tunnel peer address.
· Type of the blacklist entry.
· Remaining aging time of the blacklist entry.
· Number of dropped packets that match the blacklist entry.