Displaying blacklist logs, Figure 19, Table 16 – H3C Technologies H3C SecBlade LB Cards User Manual
Page 58
49
Figure 19 Attack prevention log configuration page
Table 16 Configuration items
Item Description
Time
Time when the attack was detected.
Type
Attack type.
Interface
Interface that receives the attack packets.
Source IP
Source IP address of the attack packets.
Source MAC
Source MAC address of the attack packets.
Destination IP
Destination IP address of the attack packets.
Destination MAC
Destination MAC address of the attack packets.
Speed
Connection speed of the attack.
Displaying blacklist logs
Select Log Report > Report > Blacklist Log from the navigation tree to enter the page as shown in
.
describes the configuration items.
Figure 20 Blacklist log configuration page
This manual is related to the following products: