Second-level Blackhole Mode

How to configure the second-level blackhole mode.

Procedure

  1. Choose Defense > Policy Settings > Global Policy
  2. Click in the Operation column.
  3. Choose one method from Second-level Blackhole Mode.

    Table 1 Second-level Blackhole Mode

    Parameter

    Description

    Automatic

    After you enable the second-level blackhole function, the device collects incoming traffic statistics every second. Once the incoming traffic exceeds the blackhole threshold, the device reports a anomaly to the ATIC. After the ATIC receives the anomaly, a blackhole task is automatically generated, and a blackhole route is delivered to the cleaning device.

    Third-party blackhole

    After you enable the second-level blackhole function, the device collects incoming traffic statistics every second. Once the incoming traffic exceeds the blackhole threshold, the device reports a syslog to the third-party device for it to enable or disable blackhole.

    NOTE:

    The configurations of the second-level blackhole mode effect only after the second-level blackhole enabled in the zone.

  4. Click Deploy to deliver configurations to the device.
  5. In the Deploy dialog box, display the deployment progress. After the deployment is complete, the dialog box closes automatically.

    • If the deployment succeeds, Deployment of the Zone is displayed as Deploy Succeed.

    • If the deployment fails, Deployment of the device is displayed as Deploy Failed.

Follow-up Procedure

Choose Defense > Policy Settings > Global Policy, select the check box of the device and click to save configurations to the configuration file of the device to avoid data loss.


Copyright © Huawei Technologies Co., Ltd.