This section describes the functions that the ATIC management center provides for the AntiDDoS devices.
The ATIC management center applies to the AntiDDoS . Table 1 lists the function differences.
| Level-1 Feature | Level-2 Feature | Level-3 Feature | Level-4 Feature | V500R001C50 |
|---|---|---|---|---|
| Home | Yes | |||
| Alarms | ||||
| Alarm Management | ||||
| Current Alarms | Yes | |||
| Past Alarms | Yes | |||
| Alarm Notification | ||||
| Remote Notification | Yes | |||
| Audible Notification | Yes | |||
| Defense | ||||
| Network Settings | ||||
| Devices | Yes | |||
| Collectors | Yes | |||
| Defense Group | Yes | |||
| Policy Settings | ||||
| Zone | Yes | |||
| Import or export Zones | Yes | |||
| Baseline Learning | Yes | |||
| Service Learning | No | |||
| Zone-based Defense Policy | ||||
| Location Policy | Yes | |||
| IP Reputation | Yes | |||
| Cleaning Bandwidth | Yes | |||
| Traffic Limiting by Destination IP | Yes | |||
| Filter | Yes | |||
| TCP | Yes | |||
| UDP | Yes | |||
| ICMP | Yes | |||
| Other | Yes | |||
| DNS | Yes | |||
| SIP | Yes | |||
| HTTP | Yes | |||
| HTTPS | Yes | |||
| Top N Study | Yes | |||
| First-Packet Discarding | Yes | |||
| New Session Limiting | Yes | |||
| Anti-Malware | Yes | |||
| Global Policy | Yes | |||
| Traffic Diversion | Yes | |||
| Black Hole Traffic Diversion | Yes | |||
| Packet Capture | Yes | |||
| Policy Template | Yes | |||
| Filter | Yes | |||
| Cloud Clean | Yes | |||
| Public Settings | ||||
| Library File | ||||
| IP location library file | Yes | |||
| URL library file | No | |||
| IP reputation library file | Yes | |||
| Botnet, Trojan horse, and worm library file | No | |||
| IP Location User-Defined | Yes | |||
| Information Collection | Yes | |||
| Report | ||||
| Report | ||||
| Traffic Analysis | ||||
| Data Overview | Yes | |||
| Traffic Comparison | Yes | |||
| Traffic Top N | Yes | |||
| Application Traffic | Yes | |||
| Protocol Traffic Distribution | Yes | |||
| Number of TCP Connections | Yes | |||
| Board Traffic | No | |||
| IP Location Top N | Yes | |||
| IP Location Traffic | Yes | |||
| Anomaly/Attack Analysis | Yes | |||
| DNS Analysis | Yes | |||
| HTTP(S) Analysis | Yes | |||
| Comprehensive Report | ||||
| Comprehensive Report | Yes | |||
| Scheduled Task | Yes | |||
| Report Download | Yes | |||
| Report Customization | ||||
| Report Customization | Yes | |||
| IP Address Description | Yes | |||
| System Administrators | ||||
| Administrators | Yes | |||
| Administrator Groups | Yes | |||
| Online Administrator | Yes | |||
| Security Policy | Yes | |||
| Authentication Server | Yes | |||
| Data Maintenance | ||||
| Performance Monitoring | Yes | |||
| Log Dump | Yes | |||
| Alarm Dump | Yes | |||
| Anti-DDoS Data Maintenance | Yes | |||
| System Backup | Yes | |||
| Log Management | ||||
| System Logs | Yes | |||
| Device Logs | Yes | |||
| Syslog-linkage Log | Yes | |||
| Syslog Receive Configuration | Yes | |||
| Notification Server | ||||
| Email Server | Yes | |||
| SMS Server | Yes | |||
| Syslog Server | Yes |