R3721-F3210-F3171-HP High-End Firewalls System Management and Maintenance Configuration Guide-6PW101
90
Figure 38 Attack prevention log configuration page
Table 21 Field description
Field Descri
p
tion
Time Time when an attack is detected
Type
Attack type
Interface
Interface that receives the attack packets
Source IP
Source IP address of the attack packets
Source MAC
Source MAC address of the attack packets
Destination IP
Destination IP address of the attack packets
Destination MAC
Destination MAC address of the attack packets
Speed
Connection speed of the attack
Displaying blacklist logs
Select Log Report > Report > Blacklist Log from the navigation tree to enter the page as shown in Figure
39.
Figure 39 Blacklist log configuration page