How to configure the second-level blackhole mode.
in
the Operation column.
Parameter |
Description |
|---|---|
Automatic |
After you enable the second-level blackhole function, the device collects incoming traffic statistics every second. Once the incoming traffic exceeds the blackhole threshold, the device reports a anomaly to the ATIC. After the ATIC receives the anomaly, a blackhole task is automatically generated, and a blackhole route is delivered to the cleaning device. |
Third-party blackhole |
After you enable the second-level blackhole function, the device collects incoming traffic statistics every second. Once the incoming traffic exceeds the blackhole threshold, the device reports a syslog to the third-party device for it to enable or disable blackhole. |
The configurations of the second-level blackhole mode effect only after the second-level blackhole enabled in the zone.
If the deployment succeeds, Deployment of the Zone is displayed as Deploy Succeed.
If the deployment fails, Deployment of the device is displayed as Deploy Failed.