beautypg.com

22 attack report, Overview, Configuring attack reports – H3C Technologies H3C SecBlade IPS Cards User Manual

Page 210: Configuration task list, Querying attack reports, Attack report

background image

22-1

22

Attack Report

Overview

The attack report module supports the attack report function and the top N attack report function.

z

The attack report displays the attack statistics of the specified segment, attack ID/source

IP/destination IP, level, action type, and time range.

z

The top N attack report displays the top 5 attacks, the top 5 source IP addresses initiating attacks,

or the top 5 destination IP addresses attacked of the specified segment, level, action type, and time

range.

You can get acquainted with the attack events in the current network by analyzing and summing up the

two types of reports.

Configuring Attack Reports

Configuration Task List

The attack report module provides the operation functions shown in

Table 22-1

.

Table 22-1 Functions of the attack report module

Function

Remarks

Querying Attack Reports

Query the attack event report, attack source report, and attack
destination report by the specified conditions.

Querying Top N Attack Reports

Query the top N attack event report, top N attack source report, and
top N attack destination report by the specified conditions.

Querying Attack Reports

Select Report > Attack Report > Attack Event Report to enter the page shown in

Figure 22-1

.

Figure 22-1 Attack Report