R3166-R3206-HP High-End Firewalls Attack Protection Configuration Guide-6PW101
4
Configuration verification
To verify the configurations, perform the following operations:
• Selecting Log Report > Report > Blacklist Log from the navigation tree to check where there are logs
for the newly added blacklist entry.
• Check whether Host A can ping Host B within 100 minutes after the entry was added.