Information Collection

This section describes the information collection function in common configurations. The AntiDDoS1820-N does not support this operation.

Device Information Collection

Choose Defense > Defense Diagnostics > Information Collection and click the Device Information Collection tab.

Device

Select a device whose information is to be collected from the drop-down list.

Information Collection Type

  • TCP Sessions (50)
  • UDP Sessions (50)
  • Destination IP Address Monitoring Table
  • Dynamic Blacklist
  • Source IP Address Monitoring Table
  • Zone Configuration
  • Interface Acceleration
  • Entry Resource
  • ACL Packet Tracing
    NOTICE:
    • By default, ACL Packet Tracing cannot be selected. To download ACL packet tracing information, first enter a destination IP address and a source IP address and click Deliver. In the Information dialog box that is displayed, click OK. Then select the check box of ACL Packet Tracing.

Log Collection

Collect log.log and sec.log files of the AntiDDoS device. Ensure that the SFTP path is on cfcard2 because the log files are saved on cfcard2 by default. For low-end devices, only log.log files can be collected.

User-defined Commands

A maximum of five commands can be user-defined. Use a new-line character to separate commands.

Defense

Choose Defense > Defense Diagnostics > Information Collection and click the Attack-Defense Information Collection tab.

Device

Select a device whose information is to be collected from the drop-down list.

Zone

Click , select a Zone on the Zone page that is displayed, and then click OK.

IP Address

Enter the destination IP address.

Time

Click to select the start time and end time of statistics. Or you can change the time values in corresponding text boxes.

Information Collection Type

Collect Anomaly/Attack Details.


Copyright © Huawei Technologies Co., Ltd.