F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Configuration Guide-6PW100

100
226BDisplaying attack prevention logs
Select Log Report > Report > Attack Prevention Log from the navigation tree to enter the page as shown
in
821HFigure 40. 822HTable 24 describes the configuration items.
Figure 40 Attack prevention log configuration page
Table 24 Configuration items
Item Descri
p
tion
Time Time when the attack was detected.
Type
Attack type.
Interface
Interface that receives the attack packet.
Source IP
Source IP address of the attack packet.
Source MAC
Source MAC address of the attack packet.
Destination IP
Destination IP address of the attack packet.
Destination MAC
Destination MAC address of the attack packet.
Speed
Connection speed of the attack.
227BDisplaying blacklist logs
Select Log Report > Report > Blacklist Log from the navigation tree to enter the page as shown in 823HFigure
41.
824HTable 25 describes the configuration items.