Operation Guide After ATIC Configuration Restoration
Prerequisites
The ATIC management center has restored the backup configuration.
Context
Mandatory operation: It indicates operations that you must manually perform after the ATIC management center restores the backup configurations (regardless of whether the existing configurations are correct). The data of the AntiDDoS and ATIC collector is not backed up. Therefore, only the data of the ATIC management center can be restored. You must perform mandatory operations for the consistency between the data of the ATIC collector and AntiDDoS and the data of the ATIC management center.
Troubleshooting: You need to confirm whether the restored data satisfies current requirements. If yes, no operation is required. If no, process the data in compliance with the requirements.
No operation is required: It indicates functions that require no manual intervention.
Procedure
Mandatory operation
Choose Defense > Policy Settings > Zone. In the column of the zone list, click . Check the data correctness. Regardless of whether data needs to be modified, click OK to reconfigure the data so that the data will be synchronized to the collector.
Choose Defense > Network Settings > Devices. Click to manually synchronize the configurations of all devices.
Choose Defense > Network Settings > Collectors. Click of the collector, and delete all associated devices and reassociate devices.
Choose Defense > Policy Settings > Zone. Click Deploy to re-deploy all Zones.
Choose Defense > Policy Settings > Zone. Stop all enabled baseline learning tasks and redeliver tasks.
Baseline learning tasks can be processed in batches.
Choose Defense > Policy Settings > Global Policy. Click and redeploy device configurations.
Choose Defense > Policy Settings > Packet Capture. Click to disable all packet capture tasks. Click to enable all packet capture tasks.
Choose Defense > Policy Settings > Filter > Zone Filter. Click . In Modify Filter, redeploy the filters of all associated zones.
No action is required if no zone is bound.
Choose System > Data Maintenance > Service Data Maintenance. Click . Check the data correctness. After confirming that the data is correct, click OK to reconfigure the data.
Choose System > Notification Server > Syslog Server. Check the data correctness. Regardless of whether data needs to be modified, click OK to reconfigure the data.
Choose Alarms > Alarm Management > Current Alarms. Restore the data that is backed up. Click Clear All to clear alarms. Otherwise, certain alarms may still exist on the page.
Choose Defense > Policy Settings > Traffic Diversion. Restore the data that is backed up. Click Clear All to delete certain traffic diversion tasks for the consistency of traffic diversion tasks between the ATIC and AntiDDoS. Before deleting the tasks, ensure that there are no DDoS attacks.
Choose Defense > Policy Settings > Blackhole. Restore the data that is backed up. You need to manually check whether the AntiDDoS and ATIC have the same blackhole configurations. If no, clear blackhole tasks on the AntiDDoS first and then deliver blackhole tasks from the ATIC to the AntiDDoS.
Troubleshooting
Click the home page. If an invalid report exists, delete it and regenerate a report. If no invalid report exists, no action is required.
Choose Alarms > Alarm Notification > Remote Notification and Choose Alarms > Alarm Notification > Audible Notification to check whether the data on the Notification Rule Details page is correct. If invalid data exists, no operation is required. If the data is incorrect, rectify it.
Choose Defense > Network Settings > Defense Group. Check whether the default group configuration is correct.
Choose Defense > Public Settings > Library File. Check whether files are correct, whether files need to be re-download and redeploy. If yes, perform related operations.
Choose Defense > Public Settings > IP Location User-Defined. Check whether the location definition is correct. If no, modify the location definition.
Choose Report > Report Customization > Report Customization. Check whether the data after restoration is correct. If no, rectify the data.
Choose Report > Report Customization > IP Address Description. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > System Administrators > Authentication Server. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Notification Server > Email Server. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Notification Server > SMS Server. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > System Administrators > Administrators. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > System Administrators > Administrator Groups. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > System Administrators > Security Policy. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Data Maintenance > Log Dump. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Data Maintenance > Alarm Dump. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Log Management > System Logs. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Log Management > Device Logs. Check whether the data after restoration is correct. If no, rectify the data.
Choose System > Log Management > Syslog-linkage Log. Check whether the data after restoration is correct. If no, rectify the data.
No operation is required.
Choose Defense > Policy Settings > Policy Template. No action is required, because the data is static data. The data backed up in real time is used.
Choose Report > Report. The data in all level-3 menus in the dedicated report does not need to be backed up or restored.
Choose Report > Report. The data in all level-3 menus in the comprehensive report does not need to be backed up or restored.
Choose System > System Administrators > Online Administrator. No action is required, and data is refreshed in real time.
Choose System > Data Maintenance > Performance Monitoring. No action is required, and data is refreshed in real time.