In the anomaly/attack type distribution chart, you can view the proportions of various anomaly/attack types.
| Parameter | Description |
|---|---|
| Device | Select a device from the drop-down list. Total Cleaning and Total Detecting are described as follows:
|
| Zone | Click ,
select a Zone on the Zone page that is displayed,
and then click OK. |
| Service | Select a service or service group
from the drop-down list. For details about service configuration, see (Optional) Creating a Service and a Defense Policy. |
| IP Address | Enter the destination IP address. Both IPv4 and IPv6 addresses are applicable. The anomaly/attack traffic destined for the IP address is queried. |
| Time | Click to select
the start time and end time of statistics. Or you can change the time
values in corresponding text boxes.The end time should be later than the start time and the interval cannot be longer than one year. |
If the device is set to Total (Cleaning) and the Zone to test, Figure 1 shows anomaly/attack type distribution within a period of time.
The distribution of anomalies/attacks that meet the query conditions is displayed.
to open or
save the query results as PDF files. A maximum of 10,000 entries can
be displayed.
to open or
save the query results as EXCEL files. A maximum of 10,000 entries
can be displayed.
to open or
save the query results as CSV files. All data except figures can be
displayed.
to enter
a recipient mail address and select an attachment format. Then click OK.