beautypg.com

Querying attack logs – H3C Technologies H3C SecBlade IPS Cards User Manual

Page 100

background image

13-10

Item

Description

Direction

Direction of the attack: from inside to outside or from outside to inside.

Src ID

The source IP address of an attack

Dest IP

The destination IP address of an attack

Src Port

The source port of an attack

Dest Port

The destination port of an attack

App Layer

The application layer protocol corresponding to an attack

Hit Count

Count of times that the attack is detected.

Severity

Severity level of an attack, including the following:

z

Emergency: The system is unavailable.

z

Alert: Information that demands prompt reaction

z

Warning: Warnings

z

Informational: Informational information

Packet Trace

Packet Trace file name generated (with the download file link)

Click Export to CSV, and a popup window appears. You can display the log contents in the format of

CSV, or save them in the format of CSV locally.

z

Select the Refresh every seconds checkbox, and the system will automatically refresh the logs in

the specified interval; click the Refresh Now button, and you can refresh the latest logs manually.

z

To display the logs in the order defined by the title items, click the title items in the log information

table.

Return to

Attack logs functions

.

Querying Attack Logs

Select Log Management > Attack Logs > Query Logs to enter the page for querying attack logs, as

shown in

Figure 13-11

. The page allows you to query attack logs based on different conditions.