Configuring the Third-Party Device to Execute the Blackhole Policy by Sending Syslogs

Procedure

  1. Choose Defense > Policy Settings > Global Policy.
  2. Click .
  3. In the Attack Defense Configuration dialog box, select Sending SYSLOG To The 3rd System for Notification Mode Of Second-Level Blackhole Event.

  4. Click OK.
  5. Click .
  6. Configure the IP address for receiving syslogs on the device.
    anti-ddos host-traffic-overflow syslog enableinfo-center source DDOS channel channel log level criticalinfo-center loghost  ip-address channel channel

    ip-address indicates the IP address of the third-party system for receiving syslogs.

    In this mode, the third-party system triggers and decapsulates the blackhole policy.


Copyright © Huawei Technologies Co., Ltd.