The anomaly/attack details record basic information about all anomalies and attacks, and you can locate anomaly or attack events.
Parameter |
Description |
|---|---|
Direction |
Select Inbound or Outbound the drop-down list. |
Device |
Select a device from the drop-down list. |
Zone |
Click |
IP Address |
Enter the destination IP address. Both IPv4 and IPv6 addresses are applicable. The anomaly/attack details of traffic destined for the IP address are queried. |
Time |
Click The end time should be later than the start time and the interval cannot be longer than one year. |
Type |
Select a log type. The type can be Total, Abnormal, or Attack. |
Min. Peak Incoming Traffic |
Set the minimum peak incoming traffic. |
Min. Peak Attack Traffic |
This parameter can be set when only the cleaning device is selected. |
Unit |
Select a traffic measurement unit. The unit can be pps or kbps. The default unit is pps. |
If the traffic of a Zone is different from the normal traffic model, that is, the traffic exceeds the threshold configured in the defense policy, the event is an anomaly event. After a traffic anomaly is detected on the cleaning device, the device has defense enabled and starts to discard packets. That is, an attack event occurs.
Attack type distribution report: Displays all types of attacks on a specified device within a period of time. For multiple attacks of the same type, only the most serious attack is displayed.
If the device is set to bj-Cleaning and the Zone to All, anomaly/attack details within a period of time are displayed, as shown in Figure 1.

If the device is set to bj-Detecting and the Zone is set to All, anomaly/attack details within a period of time are displayed, as shown in Figure 3.

to view details on anomaly/attack logs.Click
to view packet capture files associated with anomaly or attack events.
The AntiDDoS1820-N does not support this function.
You can trace attack sources, resolve packets based on the packet capture files, and download the files to obtain the details on and features of the attacker. In this way, you can work out proper defense policies. For details, see Tracing Attack Sources Through a Packet Capture File, Parsing Packets in a Packet Capture File, and Downloading a Packet Capture File.
You cannot view the packet capture files associated with certain anomaly or attack events.
to open or save the query results as PDF files. A maximum of 10,000 entries can be displayed.
to open or save the query results as EXCEL files. A maximum of 10,000 entries can be displayed.
to enter a recipient mail address and select an attachment format. Then click OK.