The ATIC Management center captures packets that meet conditions in the packet capture task, and save them into a packet capture file. The packet capture file can be used by the administrator to view attack events, trace attack sources, parse attack packets, and extract fingerprints for obtaining features and details on attackers, so that suitable defense policies can be configured. The packet capture file can also be downloaded to the local for other operations.
Choose , click the Packet Capture File tab, and manage packet capture files:
| View Event | Click of a packet capture file in the Operation column to view attack or anomaly events. For details, see Viewing Anomaly or Attack Events. |
| Trace Source | Click of a packet capture file in the Operation column to trace attack sources. For details, see Tracing Attack Sources Through a Packet Capture File. |
| Parse Packet | Click of a packet capture file in the Operation column to parse captured packets. For details, see Parsing Packets in a Packet Capture File. |
| Extract Fingerprint | Click of a packet capture file in the Operation column to extract fingerprints. For details, see Extracting Fingerprints from a Packet Capture File. |
| Download | Click of a packet capture file in the Operation column to download the file. For details, see Downloading a Packet Capture File. |
| View Packet Capture Task | Click Task Name of a packet capture file to view information about the packet capture task that generates the file. |
| Delete |
|
| Search |
|