beautypg.com

Displaying blacklist logs, Figure 19, Table 16 – H3C Technologies H3C SecBlade LB Cards User Manual

Page 58

background image

49

Figure 19 Attack prevention log configuration page

Table 16 Configuration items

Item Description

Time

Time when the attack was detected.

Type

Attack type.

Interface

Interface that receives the attack packets.

Source IP

Source IP address of the attack packets.

Source MAC

Source MAC address of the attack packets.

Destination IP

Destination IP address of the attack packets.

Destination MAC

Destination MAC address of the attack packets.

Speed

Connection speed of the attack.

Displaying blacklist logs

Select Log Report > Report > Blacklist Log from the navigation tree to enter the page as shown in

Figure

20

.

Table 17

describes the configuration items.

Figure 20 Blacklist log configuration page

This manual is related to the following products: