This section describes the information collection function in common configurations. The AntiDDoS1820-N does not support this operation.
Device Information Collection
Choose
Defense >
Defense Diagnostics >
Information Collection and click the
Device Information Collection tab.
Device
|
Select a device whose information is to be collected from the drop-down list.
|
Information Collection Type
|
- TCP Sessions (50)
- UDP Sessions (50)
- Destination IP Address Monitoring Table
- Dynamic Blacklist
- Source IP Address Monitoring Table
- Zone Configuration
- Interface Acceleration
- Entry Resource
- ACL Packet Tracing
NOTICE: By default, ACL Packet Tracing cannot be selected. To download ACL packet tracing information, first enter a destination IP address and a source IP address and click Deliver. In the Information dialog box that is displayed, click OK. Then select the check box of ACL Packet Tracing.
|
Log Collection
|
Collect log.log and sec.log files of the AntiDDoS device. Ensure that the SFTP path is on cfcard2 because the log files are saved on cfcard2 by default. For low-end devices, only log.log files can be collected.
|
User-defined Commands
|
A maximum of five commands can be user-defined. Use a new-line character to separate commands.
|
Defense
Choose
Defense >
Defense Diagnostics >
Information Collection and click the
Attack-Defense Information Collection tab.
Device
|
Select a device whose information is to be collected from the drop-down list.
|
Zone
|
Click , select a Zone on the Zone page that is displayed, and then click OK.
|
IP Address
|
Enter the destination IP address.
|
Time
|
Click to select the start time and end time of statistics. Or you can change the time values in corresponding text boxes.
|
Information Collection Type
|
Collect Anomaly/Attack Details.
|
Copyright © Huawei Technologies Co., Ltd.