HUAWEI ATIC Management Center V500R001 Configuration Guide 01 PDF
HUAWEI ATIC Management Center V500R001 Configuration Guide 01 PDF
HUAWEI ATIC Management Center V500R001 Configuration Guide 01 PDF
V500R001
Configuration Guide
Issue
01
Date
2015-07-20
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 01 (2015-07-20)
Contents
Contents
1 Conventions ................................................................................................................................... 7
2 Safety Information ...................................................................................................................... 11
3 Alarm ............................................................................................................................................. 13
3.1 Managing Alarms........................................................................................................................................................ 13
3.1.1 Managing Current Alarms ....................................................................................................................................... 13
3.1.2 Managing Past Alarms ............................................................................................................................................. 15
3.1.3 Alarm Severity Rule ................................................................................................................................................ 17
3.2 Alarm Notification ...................................................................................................................................................... 17
3.2.1 Managing Remote Notification................................................................................................................................ 18
3.2.1.1 Creating the Remote Notification Rule ................................................................................................................. 18
3.2.1.2 Modifying the Remote Notification Rule ............................................................................................................. 20
3.2.2 Configuring the Sound Notification......................................................................................................................... 21
Issue 01 (2015-07-20)
ii
Contents
Issue 01 (2015-07-20)
iii
Contents
Issue 01 (2015-07-20)
iv
Contents
Issue 01 (2015-07-20)
Contents
Issue 01 (2015-07-20)
vi
1 Conventions
Conventions
Content Conventions
The purchased products, services and features are stipulated by the contract made between
Huawei Technologies Co., Ltd. and the customer. All or part of the products, services and
features described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and recommendations
in this document are provided "AS IS" without warranties, guarantees or representations of
any kind, either express or implied.
Feature Conventions
The following operations may involve the collection of user communication information.
Huawei does not collect or store the user communication information alone. You are advised
to enable specific functions for the purpose allowed and within the scope defined in local laws
and regulations. In usage, you are obligate to take considerable measures to ensure that user
communication information is fully protected when the information is being used and stored.
Traffic mirrored by port mirroring-capable routers is the basis for traffic statistics and
analysis on a detection device but may involve the collection of user communication
information. You can choose to configure a detection device to discard mirrored traffic
after traffic statistics is collected.
Packet capturing is vital to attack source tracing and attack feature analysis but may
involve the collection of user communication information. The product provides
permission control over such functions. You are advised to clear packet capturing records
after attack source tracing and traffic analysis are complete.
The anti-DDoS collectors collects only traffic logs, not user communication information.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
Issue 01 (2015-07-20)
Symbol
1 Conventions
Description
Indicates a hazard with a medium or low level of risk,
which if not avoided, could result in minor or moderate
injury.
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or
supplement important points of the main text.
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
Italic
Courier New
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
Italic
[]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
Issue 01 (2015-07-20)
1 Conventions
Convention
Description
[ x | y | ... ] *
&<1-n>
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
>
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format
Description
Key
Press the key. For example, press Enter and press Tab.
Key 1+Key 2
Key 1, Key 2
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action
Description
Click
Double-click
Drag
Press and hold the primary mouse button and move the
Issue 01 (2015-07-20)
Action
1 Conventions
Description
pointer to a certain position.
Issue 01 (2015-07-20)
10
2 Safety Information
Safety Information
Observe the safety information to ensure the normal operating of the ATIC.
Hardware Operations
To shut down the ATIC server, you must follow the proper shutdown method in all
situations. It is forbidden to switch off the hardware power directly to shut down the
ATIC server; otherwise, the system recovery failure will be caused.
It is recommended to check the network communication every day according to the daily
maintenance items to protect the network communication from disruption.
It is forbidden to remove the network cable from the server at will when the ATIC is
running. If you really need to remove the network cable, stop the ATIC service first.
Software Operations
Do not use the ATIC server to browse Web pages. Do not set unnecessary sharing
directory. Ensure that the permissions on the sharing directory is specified.
Do not connect other computers to the network where the ATIC server resides to avoid IP
address conflict and virus infection.
Set the properties of the OS, database, and ATIC passwords by level, and assign the
passwords to the maintenance owner only. Only the maintenance owner has the
administrator password. Passwords should be strictly managed with clear properties.
Check and test the ATIC periodically according to the maintenance item list and make a
record of the check. After you discover a problem, handle it in time. For the problems
that cannot be solved, contact the local office or customer service center in time to solve
them.
ATIC Operations
Issue 01 (2015-07-20)
It is forbidden to change the system time when the ATIC is running. Set the system time
before you install the ATIC.
11
2 Safety Information
Shut down the ATIC server before you change the system time. Restart the ATIC sever
after the system time is changed. Do not set the system clock of the server ahead;
otherwise, data mess will be caused.
To log in to Windows, you must use the user name that was used to install the ATIC. Do
no change the user name for logging in to Windows.
During the use of the ATIC, ensure that data on the NE and that on the ATIC are
consistent.
Back up database periodically to minimize the system loss when errors occur.
It is recommended to synchronize NE data to the ATIC and query the latest NE data
before you set parameters.
The ATIC will display a message for dangerous operations. Please notice such warnings.
Do not set the NE to a language except Chinese and English; otherwise, the search
results will be displayed as garbles on the ATIC interface.
Issue 01 (2015-07-20)
12
3 Alarm
Alarm
Procedure
Step 1 Choose Alarms > Alarm Management > Current Alarms.
Step 2 Managing current alarms includes the following operations:
Confirm
The confirmed state indicates that the alarm is handled. According to the alarm
confirmation status, you can distinguish unhandled alarms from handled alarms, and
handle the unhandled alarms in time.
a.
b.
Click
Issue 01 (2015-07-20)
13
c.
3 Alarm
Click OK.
The ATIC Management center changes the status of the specified alarm to
Confirmed after receiving the instruction for confirming the alarm. Meanwhile, the
ATIC Management center records the confirmation person and time, refreshes all
the alarm displaying windows on the client, and updates the data in the alarm
database.
Cancel confirmation
Cancel the confirmation of a confirmed alarm.
a.
b.
Click
Clear
In some special situations, for example, the communication between the ATIC
Management center and a device disrupts, the cleared alarms reported from the device
may be lost. Once this situation appears, these alarms will not be cleared automatically if
the device does not support the function of alarm verification. To solve this problem, the
ATIC Management center supports the ability to manually clear the alarms. In other
words, manually change the uncleared state of the alarms to cleared.
a.
b.
Click
Click OK.
All the selected alarms are removed from the current alarm list to the past alarm list.
The ATIC Management center records the clearance person and time, refreshes all
the alarm displaying windows on the client, and updates the data in the alarm
database.
Export
Export some important alarms in a file, helping the administrator to locate and analyze
problems.
a.
b.
Click
Click Save.
The Save As dialog box is displayed.
d.
Select a path for saving the alarm file, enter a name for the file or use the default
file name, and click Save.
The selected alarms are exported to the specified local path.
Export all
Export all the current alarms in a file, helping the administrator to locate and analyze
problems.
a.
Click
Issue 01 (2015-07-20)
14
b.
3 Alarm
Click Save.
The Save As dialog box is displayed.
c.
Select a path for saving the alarm file, enter a name for the file or use the default
file name, and click Save.
All the current alarms are exported to the specified local path.
Refresh
The refresh policy can be Refresh every 15 seconds, Refresh every 30 seconds,
Refresh every 60 seconds, or Stop Refresh.
Refresh every 30 seconds is selected by default. This means that the ATIC Management
center server performs a round robin every 30 seconds. Once a new alarm occurs, the
ATIC Management center will refresh it to the current alarm list.
Search
Set the conditions to search for the desired alarms. The search method can be the basic
search or advanced search.
When you select Search, you can search for alarms by alarm severity.
When you select Advanced Search, you can search for alarms by alarm severity,
alarm type, confirmation status, alarm source, and alarm occurrence time.
You can click Reset to clear all the specified parameter values.
View
ii.
You can click the times of an alarm to view the occurrence time, confirmed status
and time, clearance status and time, and notification type of the alarm.
According to the alarm notification type, you can know whether the alarm is a new
alarm, manual clear or automatic clear.
----End
Procedure
Step 1 Choose Alarms > Alarm Management > Past Alarms.
Step 2 Managing past alarms includes the following operations:
Export
Export some important alarms in a file, helping the administrator to locate and analyze
problems.
Issue 01 (2015-07-20)
15
3 Alarm
If the Internet Explorer executes the default security policy, the To help protect you security, Internet
Explorer blocked this site from downloading file from to your computer message is displayed upon
an export operation. In this case, right-click the message, and choose Download File from the shortcut
menu. After the interface is refreshed, export the event information again.
a.
b.
Click
Click Save.
The Save As dialog box is displayed.
d.
Select a path for saving the alarm file, enter a name for the file or use the default
file name, and click Save.
The selected alarms are exported to the specified local path.
Export all
Export all the past alarms in a file, helping the administrator to locate and analyze
problems.
a.
Click
Click Save.
The Save As dialog box is displayed.
c.
Select a path for saving the alarm file, enter a name for the file or use the default
file name, and click Save.
All the past alarms are exported to the specified local path.
Search
Set the conditions to search for the desired alarms. The search method can be the basic
search or advanced search.
When you select Search, you can search for alarms by alarm severity.
When you select Advanced Search, you can search for alarms by alarm severity,
confirmation status, alarm source, and alarm occurrence time.
You can click Reset to clear all the specified parameter values.
View
ii.
You can click the times of an alarm to view the occurrence time, confirmation status
and time, clearance status and time, and notification type of the alarm.
According to the alarm notification type, you can know whether the alarm is a new
alarm, manual clear or automatic clear.
----End
Issue 01 (2015-07-20)
16
3 Alarm
Context
The anti-DDoS device provides four severity levels for the alarms:
Critical
Major
Minor
Warning
Alarm severity may change during DDoS attacks. As the attack traffic volume increases or
decreases, alarms in the ATIC management center need to record the highest level and current
level.
Procedure
Step 1 Choose Alarms > Alarm Management > Alarm Severity Rule.
Step 2 In the Alarm Severity Rule area, click
Step 3 For the parameters of user-defined alarm severity rules, see Table 4-1.
Table 3-1 Parameters of user-defined alarm severity rules
Parameter
Description
Concurrent Connections
New Connections
Duration
Action
----End
Issue 01 (2015-07-20)
17
3 Alarm
Click the name of a remote notification rule. The page shows the details about
the remote notification rule is displayed. Click
on this page to
modify the basic information, notification target, resource information, and alarm
information about the notification rule. For details about this operation, see
4.2.1.2 Modifying the Remote Notification Rule.
Enable
Select one or more remote notification rules that are in the Disabled state, and
click
After the remote notification rules are enabled, the alarm information will be sent
to the specified email addresses.
Disable
Select one or more remote notification rules that are in the Enabled state, and
click
After the remote notification rules are disabled, the alarm information will not be
sent to the specified email addresses.
Search
Enter the full or partial name of a remote notification rule or resource and click
. The remote notification rules that meet the search condition will be
displayed in the Remote Notifications.
If no remote notification rule meets the search conditions, the Remote
Notifications will be empty.
Delete
to delete the
NOTE
Deleting the notification rules cannot be undone. Perform this operation with caution.
Context
You can use the configured mail or SMS server to send the alarm information to the specified
email address to learn about the device status in time. For details about how to configure the
notification server, see 10.4 Notification Server.
Issue 01 (2015-07-20)
18
3 Alarm
Procedure
Step 1 Choose Alarms > Alarm Notification > Remote Notification.
Step 2 Click
Step 3 Set the parameters of the remote alarm notification rule, as described in Table 4-2.
Table 3-2 Setting the parameters of the remote alarm notification rule
Parameter
Description
Recommended Value
Name
Status
Click
to select the start time. Click OK or
double-click the selected time.
Click
to select the end time. Click OK or
double-click the selected time.
Sending
contents
Description
Issue 01 (2015-07-20)
19
3 Alarm
Step 4 Click Next. Select the type of resource on which the remote alarm notification will be applied
from the resource tree on the left, and select the resource from the resource list on the right.
Only one type can be selected. In the resources list on the right, you can search for the desired
resources by name or IP address.
Such resources are alarm sources. For example, if Zone is selected for resources, the remote notification
function must be applied to alarms generated by the anti-DDoS component of the ATIC Management
center. if AntiDDoS is selected for resources, the remote notification function must be applied to alarms
generated by the AntiDDoS. If Management System is selected for resources, the remote notification
function must be applied to alarms generated by the ATIC Management center system itself.
Step 5 Click Next. Select the alarm to send for the remote notification.
You can search for the desired alarms by setting the alarm severity level (critical, major, minor,
or info). Then, select the specific alarms to send. For example, you can set Critical for the
alarm severity level to search for all the critical alarms of the device, and select the specific
alarm to send.
Step 6 Click Next. Select the sending mode, and add the mobile phone number or email address for
receiving remote notification messages.
Either the mobile phone number or the email address must be specified.
A maximum of 10 mobile phone numbers or email addresses can be added at a time. The
mobile phone number or email address must be unique.
Result
If the notification server parameters are pre-specified, the recipient email box will
receive the alarm once the specified alarm occurs after the remote notification is created
successfully.
If the remote notification rule is expired, then the state of the rule in the list is Expired.
Context
You cannot modify the remote notification rule in Expired state.
Procedure
Step 1 Choose Alarms > Alarm Notification > Remote Notification.
Step 2 Click the name of a remote notification.
Issue 01 (2015-07-20)
20
3 Alarm
Click
2.
3.
Click OK.
Click
2.
Select the sending mode, and add the email address for receiving the alarm information.
3.
Click OK.
Click
Select the devices that do not need the remote alarm notification and click
to delete the selected devices from the resource list.
You can also enter the full or partial name of a device and click
the devices that you want to delete.
to search for
Click
You can also select the security from the drop-down box and click
for the alarms that you want to delete.
to search
----End
Context
The alarm severity level can be critical, major, minor, or warning. The sound can be a
Normal or a Cyclic for different alarm severity levels.
If the sound type is set Normal, the system plays the audio notification per thirty
seconds for the highest level and Uncleared and Unconfirmed alarms. If the sound type
is set Cyclic, the system plays cyclic audio notifications for the Uncleared and
Unconfirmed alarms. It is recommended to set Cyclic for critical and major alarms in
Issue 01 (2015-07-20)
21
3 Alarm
case that the maintenance personnel is not on site temporarily and cannot hear the alarm
sound.
You can click Restore Defaults to set the alarm sound to the default value. The sound
notification is enabled for the Critical alarms by default.
There will be no sound notification for the alarms occurring on the masked resources or
the confirmed alarms.
It is not recommended to disable the sound notification for all levels of alarms, avoiding
the delayed handling of alarms.
Procedure
Step 1 Choose Alarms > Alarm Notification > Audible Notification.
Step 2 Click
Step 3 Select an alarm severity level on the Modify Alarm Sound page to enable the sound
notification for this alarm severity level.
Step 4 Select a sound warning type from the Type drop-down list box.
----End
Follow-up Procedure
You can click
in the upper right corner of the ATIC Management center interface to
enable or disable the mute function.
Issue 01 (2015-07-20)
22
Issue 01 (2015-07-20)
23
Prerequisites
The installation of the ATIC Management center server software is complete. For details, see
Installation Guide.
Context
Upon the first login, use the default super administrator account admin and password
Admin@123.
Procedure
Step 1 Open the Web browser.
The ATIC Management center supports Internet Explorer 8.0, Firefox 3.6, and the Firefox
browser of later versions.
Step 2 Enter https://server IP address:port (the port can be omitted if port 443 is used.) in the
address bar and press Enter.
Step 3 Select a language on the login page and enter the correct user name, password, and
verification code.
The default user name is admin and its password is Admin@123.
Step 4 Click Log In.
Step 5 The system prompts that Initial login.Please change your password. on the Web page. Enter
a new password and confirm it. Then click OK.
Step 6 Click OK in the Succeeded dialog box.
----End
Context
The administrator can query only customized content.
Procedure
Step 1 On the ATIC Management center homepage, click
Step 2 Click
Step 3 On the Create Homepage Customization Profile page, select the content to be customized,
set given conditions, and click OK.
The customized content is displayed on the homepage.
Issue 01 (2015-07-20)
24
to save the
----End
Prerequisites
The communication has been set up between the ATIC Management center server and
the AntiDDoS devices.
Procedure
Step 1 Choose Defense > Network Settings > Devices.
Step 2 Click
Issue 01 (2015-07-20)
25
Step 3 In the Basic Information group box, set the name and IP address of an AntiDDoS device and
set Device Type to AntiDDoS.
Step 4 Set Telnet parameters.
When you select Telnet, the ATIC Management center uses port 23 for accessing
AntiDDoS devices through Telnet by default. In this case, enter the name and password
of a Telnet user for authentication.
When you select STelnet, the ATIC Management center uses port 22 for accessing
AntiDDoS devices through STelnet by default. In this case, enter the name and password
of an STelnet user for authentication.
When you select SNMPv1 and SNMPv2c, set read and write community names.
Read community indicates the name of a read-only community and the default value is
public. Write community indicates the name of a write-only community and the default
value is private.
Issue 01 (2015-07-20)
26
When you select SNMPv3, see parameter settings as shown in Table 5-1.
The Username, Environment name, Environment engine ID, Data encryption protocol, Data
encryption password, Authentication protocol, Authentication password parameters are available
only when the type is SNMPv3.
Description
Recommended Value
Username
Environment name
Environment engine ID
Unique identifier of an
SNMP engine. This ID is
used together with the
environment name to
determine an environment
that uniquely identifies an
SNMP entity. The SNMP
message packet is processed
only when the environments
of the sender terminal and
the recipient terminal are the
same; otherwise, the SNMP
message packet will be
discarded.
Authentication protocol
Authentication password
Issue 01 (2015-07-20)
If the authentication
protocol is used when
verifying messages, you
need to set the
HMACMD5 converts
the character string in
any order based on the
hash algorithm and
produces a 128-bit
message digest, in
integer format.
HMACSHA possesses
higher security than
HMACMD5.
HMACSHA produces a
160-bit message digest
for the binary messages
not longer than 264 bits.
27
Parameter
Description
Recommended Value
authentication password.
Data encryption protocol
Result
Each AntiDDoS device is automatically synchronized once it is added. If synchronization fails,
rectify the fault as prompted and synchronize AntiDDoS devices manually with the ATIC
Management center.
Follow-up Procedure
If only one collector is available, the new AntiDDoS devices are automatically associated
with the collector. If multiple collectors are available, associate AntiDDoS devices with the
given collector.
Issue 01 (2015-07-20)
28
Prerequisites
Before you create an SAS, ensure that the following are available:
IP addresses of devices
Context
The Service Analyse Server (SAS) is the service processing center of the SIG1000E/9280E
system. It is responsible for receiving and analyzing service information reported by the SRS,
and saving the information to the database. ATIC Management center needs to synchronize
the Zone on the SIG1000E/9280E device using the SAS database.
Procedure
Step 1 Choose Defense > Network Settings > Devices.
Step 2 Click
Step 3 In the Basic Information group box, set the name and IP address of an device and select SIG
SAS for Device Type.
Issue 01 (2015-07-20)
29
Step 4
Description
Value
Database IP
Address
Database
username
Database
password
Areas to Be
Synchronized
Issue 01 (2015-07-20)
30
Parameter
Description
Value
Management center.
Prerequisites
Before you create an Syslog-linkage Device, ensure that the following are available:
IP addresses of devices
Context
The Syslog-linkage Device analyzes traffic and sends logs to the ATIC Management center.
After analyzing anomaly logs reported by the Syslog-linkage Device, the ATIC Management
center generates a traffic diversion task and delivers it to the cleaning device in the same
defense group.
Procedure
Step 1 Choose Defense > Network Settings > Devices.
Step 2 Click
Step 3 In the Basic Information group box, set the name and IP address of an device and select
Syslog-linkage Device for Device Type.
Issue 01 (2015-07-20)
31
Issue 01 (2015-07-20)
32
Click
of an collector and bind the collector to one or more anti-DDoS
devices. For details, see 5.4.2 Associating the Collector with the devices.
Modify
Click
NOTE
The collector in Down state cannot be modified.
Delete
NOTE
Collectors being associated with the device cannot be deleted.
View
State
Indicates the connection state between the ATIC server and the collector.
indicates that the collector is online. That is, the ATIC server and
collector are connected and the collector service has been started.
indicates that the collector is offline. The possible causes are: the IP
address of the collector is changed, the ATIC server fails to connect to the
collector, and the collector service is not started.
Device
Quantity
CPU,
Memory,
Disk
Informatio
n
Procedure
Step 1 Choose Defense > Network Settings > Collectors.
Step 2 On the Collectors page, click
Issue 01 (2015-07-20)
33
Step 3 On the Create Collector page, select Anti-DDoS from the Collector Type drop-down list.
Step 4 Set other parameters of the collector. For details, see Table 5-3.
Table 4-3 Collector parameters
Parameter
Description
Value
Name
IP Address
Encryption Key
If the system displays Failed to connect the collector Possible causes: The IP address
of the collector is incorrect, or the collector is not started, or the connectivity error
occurs., the ATIC Management center and collector cannot be normally connected.
Perform the check according to the displayed cause.
Issue 01 (2015-07-20)
34
----End
Follow-up Procedure
You can view, modify, or delete a collector by referring to 5.4 Configuring an Collector.
Prerequisites
Devices have be added. For details on how to add devices, see 5.3 Adding Devices.
The anti-DDoS collector has been added. For details on how to add the anti-DDoS
collector, see 5.4.1 Adding a Collector.
Procedure
Step 1 Choose Defense > Network Settings > Collectors.
Step 2 On the Collectors page, click
Step 4 On the Select Device page, select the check box of the device to be associated.
Step 5 Click OK.
The device associated with the collector is displayed in Associated devices.
----End
Issue 01 (2015-07-20)
The detecting device and cleaning device can be added to a defense group. In a defense
group, the detecting device reports anomaly traffic to the ATIC Management center, and
35
the ATIC Management center delivers a traffic diversion task to the cleaning device.
Then the cleaning device performs traffic diversion and cleaning.
Cleaning Device Linkage: When multiple cleaning devices are added into a defense
group and any cleaning device in the group detects attack traffic, the cleaning device
interworks with others to divert and clean attack traffic.
When two or more detecting devices exist on the network, add them into a defense group
and select a working mode, load redundancy or load sharing.
If a detecting device not in any defense group detects abnormal traffic, the device will divert the traffic
to cleaning devices that do not belong to any defense group.
Management Operation
Choose Defense > Network Settings > Defense Group, and manage defense groups.
Creat
e
Modi
fy
Delet
e
Click
Group.
Click
View
above
1. Click the name of the defense group to be viewed for its basic information and
device information.
2. Click Close to close the dialog box.
Step 3 Set the basic parameters of the defense group. For details, see Table 5-4.
Table 4-4 Defense group parameters
Param
eter
Issue 01 (2015-07-20)
Description
Value
36
Param
eter
Description
Value
Name
Indicates the
name of the
defense
group.
Cleanin
g
Device
Linkag
e
When the
cleaning
device
linkage is
enabled and
any cleaning
device in the
defense group
detects attack
traffic, the
cleaning
device
interworks
with other
devices to
clean attack
traffic.
Detecti
ng
Mode
Indicates the
detecting
mode when
two or more
detecting
devices work
together.
Load Sharing
In load sharing mode, all detecting devices detect traffic
collectively. This mode applies to heavy traffic scenarios
and poses high requirements on device performance.
Reports cover the total traffic of all detecting devices.
Load Redundancy
In load redundancy mode, detecting devices detect the same
traffic (by mirroring or optical splitting), improving
detection reliability. Reports cover the traffic of only one of
the detecting devices.
Descrip
tion
Indicates
remarks
information
for
identifying a
defense
group.
Issue 01 (2015-07-20)
37
2.
On the Select Device page that is displayed, select the check box of an device and click
OK.
After successfully added, the device is displayed in the device list on the Create Defense
Group page.
Issue 01 (2015-07-20)
38
Click
Modi
fy
Click
of the Zone to be modified, and modify the Zone. For the parameter
description, see 6.1.1 Adding a Zone.
Delet
e
NOTICE
Once the Zone is deleted, all the services, policies, packet-capturing tasks, diversion tasks,
baseline-learning tasks, and service-learning tasks under the Zone will be deleted, and the
Zone will be undeployed from all associated devices. Perform this operation with caution.
Issue 01 (2015-07-20)
above
39
Expo
rt
Expo
rt All
Impo
rt
View
1. Click the account or name of the Zone to be viewed for its basic information
and IP address.
2. Click Close to close the dialog box.
Searc
h
Basic search
On the upper right of the page, enter the account/name of the Zone to be
searched for and click
displayed on the page.
Advanced search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions such as
Account/Name, Type, or IP Address, and then click Search.
Prerequisites
To add a Zone and associate it with devices, ensure that devices associated with the Zone have
been discovered by the ATIC Management center.
Context
The Zones are classified into user-defined Zones, default Zones, and SIG1000E/9280E Zones.
User-Defined Zones
To protect specific IP addresses/address segments, the administrator can manually create
user-defined Zones and add the IP addresses/address segments to the user-defined Zones.
The anti-DDoS device uses defense policies to provide refined defense for traffic of
these IP addresses/address segments.
The type of such Zones is User-Defined.
Issue 01 (2015-07-20)
Default Zones
40
One default Zone is automatically added when you add an anti-DDoS device. Each
anti-DDoS device can be associated with only one default Zone, which does not have
any given IP address. Refined defense can be implemented by the anti-DDoS device on
the destination IP addresses except those in User-Defined Zones.
The type of such Zones is Default.
If a network is large or covers multiple areas and each administrator needs to manage one part
of the network, you can create multiple Zones and authorize each administrator the
permission of managing the corresponding Zone.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 On the Zone List page, click
Step 3 Set the basic parameters of the Zone. For details, see Table 6-1.
Table 5-1 Zone Basic Information
Para
meter
Description
Value
Accou
nt
Type
Name
Conta
ct,
Phone
,
Mobil
e
Issue 01 (2015-07-20)
41
Para
meter
Description
Value
Indicates the
detailed description
on the Zone.
Phone
, Post
Code,
Email
,
Addre
ss
Descri
ption
1.
2.
Click
3.
Description
Value
IP
Indicates the IP
Issue 01 (2015-07-20)
42
Para
meter
Description
Value
Type
address type.
4.
Click OK.
The new IP address is displayed in the IP Address list.
Step 5 Click the Devices tab to associate devices with the Zone. Select the check box of an device
and click OK.
When the Zone is a Service Inspection Gateway (SIG1000E/9280E), the SIG1000E/9280E is
automatically added to the associated device list.
To divert the traffic destined for a Zone to a specific VPN instance of the device, select the
VPN instance in the VPN column.
Step 6 Click the Policy tab to configure a defense policy and traffic diversion.
1.
2.
Select Packet Capture Task. Then the cleaning device captures the packets discarded
due to attacks upon the Zone. This assists in analyzing attack events.
3.
to create IP addresses
After a static traffic diversion task is delivered, all traffic destined for the IP address is
diverted to the cleaning device.
When you specify certain IP addresses or IP address segments for traffic diversion in a
protected IP address segment, split the IP address segment and select the subnet after
splitting.
Issue 01 (2015-07-20)
a.
Click
b.
On the Splitting Setting page, enter the mask splitting length and click Split.
43
The mask splitting length ranges from 1+number of mask bits to 8+number of mask
bits. For example, the mask of a protected IP address segment is 255.255.0.0. That
is, the number of mask bits is 16. In this case, the mask splitting length ranges from
17 to 24.
c.
d.
Click OK.
e.
Select a subnet IP address after splitting on the Create Traffic Diversion Task
page.
Step 7 Click OK to complete the Zone adding on ATIC Management center. Click Deploy to deploy
the Zone configuration to devices.
----End
Follow-up Procedure
You can view, modify, or delete a Zone by referring to 6.1 Configuring the Zone.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click
Step 4 Fill in all parameters on the template. For parameter settings, see 6.1.1 Adding a Zone.
Step 5 Import the file to the ATIC Management center.
1.
2.
----End
Issue 01 (2015-07-20)
44
Follow-up Procedure
You can export Zones, see 6.1 Configuring the Zone.
Description
Configure
defense
policies
Click
of the Zone. For details, see 6.2.1 Configuring a Defense
Mode, 6.2.2 Configuring a Filter, and 6.2.6 Configuring the Zone-based
Defense Policy.
Policies configured for a Zone take effect only after they are deployed on
associated devices.
Deploy
Undeploy
Description
Zone
Indicates the Zone name defined when you create the Zone. For details, see 6.1.1
Adding a Zone.
Type
Device
Name
Indicates the detecting or cleaning device that provides anti-DDoS services for
the Zone.
Service
Learnin
Indicates the state of the Zone-associated devices that perform service learning
on traffic.
Issue 01 (2015-07-20)
45
Param
eter
Description
Click the state value to configure the service learning task or view service
learning results. For details, see 6.2.4.2 Configuring a Service Learning Task.
Baselin
e
Learnin
g
Indicates the state of the Zone-associated devices that perform baseline learning
on traffic.
State
Click the state value to configure the baseline learning task or view baseline
learning results. For details, see 6.2.5 Adjusting a Threshold (by Baseline
Learning).
Normal: The Zone traffic is normal or the Zone is not associated with any
AntiDDoS.
Abnormal: The Zone traffic does not comply with the normal model. That
is, the traffic exceeds the threshold specified in the defense policy.
Attacked: After traffic anomalies are detected on the cleaning device and the
defense mechanism is enabled, the cleaning device starts to discard packets
and the packet drop probability is higher than the specified value.
Indicates the state that the cleaning device processes anomaly or attack traffic
for the Zone.
Not defended: The Zone traffic is abnormal, but the defense mechanism is
not enabled for abnormal traffic. You need to manually enable the defense
mechanism.
Issue 01 (2015-07-20)
Not diverted: The traffic that is forwarded to the Zone has not been diverted
to the cleaning device.
46
Param
eter
Description
is delivered to the cleaning device after the administrator confirms it.
Confirmed Divert is displayed only when the NFA2000 serves as a
detecting device.
On the anti-DDoS network in off-line deployment, when one of the following
status occurs, click the corresponding diversion state to check whether a traffic
diversion task is created for the Zone or the traffic diversion task is enabled on
the Traffic Diversion Task List tab page. For details, see 7.2.3 Configuring
BGP Traffic Diversion (ATIC).
Deploy
ment
State
The diversion state of the Zone is Not diverted and the Zone state is
Abnormal.
The diversion state of the Zone is Partial Diversion and the Zone state is
Abnormal.
The diversions status of the Zone is Confirmed Divert and the Zone status is
Normal.
Indicates the state whether the Zone policy is deployed on devices. The value
can be Undeployed, Deploy Succeed, Part Deployed, or Deploy Failed.
If Deployment is Deploy Failed, click Deploy Failed to view details on policy
deployment and undeployment on the Zone-associated devices.
If Deployment is Part Deployed, click Part Deployed to view the new policies
that are not deployed on the Zone-associated devices.
Prerequisites
A Zone has been created. For details, see 6.1 Configuring the Zone.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click
Step 3 Configure basic policies. Table 6-5 lists the basic policy parameters.
Table 5-5 Parameters of defense modes
Para
mete
r
Description
Value
Traffi
c
Diver
Indicates the
mode in
which the
Issue 01 (2015-07-20)
47
Para
mete
r
Description
sion
Mode
detecting
device diverts
anomaly
traffic of the
Zone to the
cleaning
device.
Value
Defe
nse
Mode
Indicates the
defense mode
of the
cleaning
device after
abnormal
traffic is
detected.
During the
defense,
detected
illegitimate
source IP
addresses are
dynamically
blacklisted.
Clean
ing
Band
width
Limits the
traffic on
which
Zone-based
attack
defense is
implemented
below the
Issue 01 (2015-07-20)
48
Para
mete
r
Description
Value
threshold.
Excess
packets are
directly
discarded.
Traffi
c
Limit
ing
for
Singl
e IP
Addr
ess
Limits traffic
of a single IP
address of the
Zone below
the threshold.
Excess
packets are
directly
discarded.
Appl
y an
IPSec
polic
y.
If an IPSec
policy is
applied,
packet
filtering is
triggered.
C&C Domain
Web Injection
DoS Tools
Follow-up Procedure
Basic policies configured for the Zone take effect only after deployed on associated devices.
For details, see 6.2.12 Deploying the Defense Policy.
Filter Category
The AntiDDoS provides IP, TCP, UDP, HTTP, DNS, ICMP, and SIP filters. For details, see
Table 6-6.
The IP filter can process all types of IP packets whereas other filters can only process the
packets of their own types. For example, the HTTP filter can process only HTTP packets.
You can configure a maximum of 128 filters on one anti-DDoS device.
Table 5-6 Seven filters
Filter
Issue 01 (2015-07-20)
Filtering Condition
49
Filter
Filtering Condition
IP filter
TCP filter
UDP filter
ICMP
filter
HTTP
filter
DNS filter
SIP filter
Filter Template
The ATIC Management center provides 10 common filter templates. You can use any of them
as required.
DNS_Amplification
Chargen_Amplification
SNMP_Amplification
TFTP_Amplification
NTP_Amplification
NetBIOS_Amplification
SSDP_Amplification_Attack
QOTD_Amplification
Quake_Network_Protocol
Steam_Protocol_Amplification
Issue 01 (2015-07-20)
50
Operation
Choose Defense > Policy Settings > Filter, and config the filter.
Create
Click
Filter.
Modify
Delete
Search
Click
in the Operation column and modify the filter in the Modify
Filter dialog box.
Select the check box for the filter and click
Enter part of a filter name or the full name in Name and click
Procedure
Step 1 Choose Defense > Policy Settings > Filter.
Step 2 Click
Step 3 On the Basic Information tab page, configure basic information about the filter. Table 6-7
lists parameters and Table 6-8 lists keywords.
Table 5-7 Basic information about the filter
Parameter
Description
Value
Name
Protocol
Indicates a protocol
type.
Operation
Indicates an action
for matched packets.
Issue 01 (2015-07-20)
51
Parameter
Description
This parameter is
required when
Operation is set to
Rate Limiting.
Threshold
Value
Description
Value
source
-ip
IP address
mask
IP address
mask
Indicates the
destination IP address
and subnet mask of a
packet.
min
ttl
finger
print
Issue 01 (2015-07-20)
ttl
offset
content
Indicates the
fingerprint content.
depth
max
52
Keyword
Description
Value
protoc
ol
protocol
dscp/fr
agmen
t
dscp/fragme
nt
tcp-fla
g
TCP flag
destin
ationport
start port
source
-port
start port
opcod
e/cook
ie/host
/refere
/user-a
gent
opcode/cook
ie/host/refere
r/user-agent
uri
URI
qr
qr
domai
n
domain
Issue 01 (2015-07-20)
end port
end port
53
Keyword
Description
Value
matched content.
You can configure a maximum of 512
domain keywords for each HTTP filter,
and a maximum of 512 for each device.
type
type
caller/
callee
Caller/Callee
2.
Click
Only the Zones whose Deployment State is Deploy Succeed are displayed on the page.
Ensure that the Zone to be bound has been deployed.
Two modes are available for binding a Zone to a filter. For details, see 6.2.2.2 Associating a
Zone with a Filter.
Step 5 Click Deploy.
When the Zone is associated with the filter and you click Deploy, the filter is deployed
on the AntiDDoS and configurations take effect.
When only the filter is created and you click Deploy, filter configurations are saved on
the ATIC Management center. They take effect only after the filter is associated with the
Zone and is deployed again.
----End
of the Zone.
54
Only the Zones whose Deployment State is Deploy Succeed are displayed on the page.
Check whether the Zone to be associated is successfully deployed.
Step 5 Click Deploy to deploy the filter to the AntiDDoS.
----End
Prerequisites
The latest IP location database file has been loaded. For details, see 6.2.9 Library Files.
Context
Many Internet attacks are launched by attackers by controlling botnet hosts that may locate in
a specific region. The location blocking policy blocks traffic by region to effectively block
attacks from a specific region.
Public IPv4 addresses have been divided by country in the IP location database file. If the IP
location division granularities in the IP location database file cannot meet requirements, you
can create user-defined IP locations. For details, see 6.2.8 Creating User-defined IP Locations.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click
of the Zone.
Issue 01 (2015-07-20)
55
Prerequisites
The basic policies of the Zone have been configured. For details, see 6.2.1 Configuring a
Defense Mode.
Context
During traffic cleaning, the cleaning device first matches services by destination IP address,
service type, and destination port. After successful matching, detection and defense are
performed according to service-specific defense policies. Otherwise, detection and defense
are performed on default defense policies by protocol type.
Issue 01 (2015-07-20)
56
Only traffic limiting can be configured for certain devices in the defense policy of services. In this case,
detection and defense are performed on the traffic of services according to the default defense policy.
The procedure is as follows: When cleaning traffic, the cleaning device first matches services by service
type and destination IP address. After successful matching, the cleaning device matches the default
defense policy by protocol type for detecting and defense. Then the cleaning device limits traffic
according to the traffic limiting policy of services.
Service learning can be used to configure TCP and UDP services. For details, see 6.2.4.2
Configuring a Service Learning Task.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click
of the Zone.
Step 4 On the Basic Information tab page, configure the basic information of the service. Table 6-9
shows parameters.
Table 5-9 Parameters of services
Parameter
Description
Value
Name
Device Name
Protocol
Protocol ID
Destination
Port
Description
Issue 01 (2015-07-20)
57
Click all tabs and configure defense policies for services. For parameters, see 6.2.6
Configuring the Zone-based Defense Policy.
You are advised to enable baseline learning to configure the thresholds of defense
policies. For details, see 6.2.5 Adjusting a Threshold (by Baseline Learning).
Click Import Policy Template to import service policy configurations in the service
policy template.
Step 6 Optional: Click Export Policy Template to save current service policy configurations as a
template for future use.
For details on how to manage policy templates globally, see 6.2.10 Configuring Policy
Templates.
Step 7 Click OK.
----End
Example
A server is deployed in a Zone to provide HTTP services by port 8080. To protect this server,
the configuration roadmap of a defense policy is as follows:
1.
Configure the defense policies default defense policy. Considering possible Telnet and
ping operations, limit the traffic of the TCP and ICMP services and block the UDP
service and other services to prevent network congestion.
2.
Create a HTTP service with destination port 8080 and IP address used by the server to
provide HTTP services. The service provides refined defense for HTTP services.
Follow-up Procedure
1.
Services configured for the Zone take effect only after deployed on devices. For details,
see 6.2.12 Deploying the Defense Policy.
2.
You are advised to enable baseline learning to adjust the threshold configurations of
service policies. For details, see 6.2.5 Adjusting a Threshold (by Baseline Learning).
5.2.4.1 Overview
Service learning and dynamic baseline learning. In service learning, the system learns the
service model (protocol type and port number of the traffic destined for the Zone) of the Zone
to enable a proper attack defense policy.
The AntiDDoS provides Zones with differentiated defense policies.
When multiple ports are enabled for the Zone and refined defense is required for a certain port,
you need to adopt service-based defense to learn about the traffic model and identify Zone
services, thereby providing defense policies for given services in the Zone.
With service learning, the AntiDDoS can identify the services of the Zone and figure out TCP
and UDP services whose traffic hits the threshold, including the protocol type, port, IP address,
and specific traffic value. In this way, the device obtains the service list of the Zone.
In service learning, the AntiDDoS learns statistics on inbound traffic, regardless of normal or
abnormal traffic. Therefore, service learning needs to be enabled when Zone traffic is normal.
During the learning, if the Zone is abnormal or under attacks, you need to terminate the
current service learning task and recover it until Zone traffic resumes normal.
Issue 01 (2015-07-20)
58
Prerequisites
The user-defined Zones have been added and IP addresses have been configured. For
details, see 6.1.1 Adding a Zone.
The basic policies of the Zone have been configured and deployed on the associated
devices. For details, see 6.2.1 Configuring a Defense Mode.
Devices associated with the Zone have been bound to collectors. For details, see 5.4.2
Associating the Collector with the devices.
Context
To ensure accurate learning results, enable the service learning task when traffic of the Zone is
normal.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click the Zone's state in the Service Learning column.
Step 3 Configure a service learning task. For parameters, see Table 6-10.
Table 5-10 Parameters of configuring a service learning task
Parameter
Description
Value
Start Time
End Time
Traffic
Threshold
Confirmatio
n Method
Determines whether to
automatically add service learning
results to the service list of the Zone.
If Automatic confirmation is
configured, select top N services
with heaviest traffic in Automatic
confirmation top N for automatic
confirmation.
Step 4 Click Start to enable the service learning task of the Zone.
Issue 01 (2015-07-20)
59
----End
Result
With enabled service learning, if the traffic of a service in the Zone exceeds Traffic
Threshold, the service is displayed in service learning results.
The format of the service name is service type-port number. The traffic volume reaches
the upper limit of the service traffic.
b.
Click
c.
of the Zone.
Click
of each service to modify the basic information and configure defense
policies of the service. For parameters of the defense policies, see 6.2.6 Configuring
the Zone-based Defense Policy.
Follow-up Procedure
Prerequisites
The service learning task has been enabled. For details, 6.2.4.2 Configuring a Service
Learning Task.
Issue 01 (2015-07-20)
60
Context
Service learning results contain service names, types, ports, IP addresses, associated devices,
and traffic. During the confirmation of service learning results, the system checks whether
services of the same type and port exist on the associated device in the service policy of the
Zone, and performs corresponding processing.
1.
2.
If no such service exists, add services to the policy of the Zone, including service names,
types, ports, IP addresses, and associated devices.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click the Zone's state in the Service Learning column.
Step 3 In the Service Learning Result List group box, select the check box of a service and click
Apply.
----End
Result
1.
2.
Click
3.
On the Service tab page, you can view applied service learning results.
of the Zone.
Click
of each service to modify the basic information and configure defense
policies of the service. For parameters of the defense policies, see 6.2.6 Configuring the
Zone-based Defense Policy.
Follow-up Procedure
After service learning results are applied to the Zone, configurations take effect only after
deployed on devices. For details, see 6.2.12 Deploying the Defense Policy.
5.2.5.1 Description
Dynamic baseline learning provides references for configuring the defense threshold.
The defense policy refers to setting a proper threshold for the traffic volume of a protocol.
When the traffic on the live network exceeds the threshold, the system identifies that an
anomaly occurs and triggers the corresponding attack defense.
Before configuring the defense policy, you may be assailed by two doubts:
1.
2.
Issue 01 (2015-07-20)
61
The ATIC system supports diversified types of attack defense. You can enable corresponding
attack defense if desired, but not all defense functions. When services on the network are
unknown, you can learn about services on the network by using service learning, and then
determine whether to enable attack defense.
During defense policy configurations, the system prompts you to set defense thresholds for
policies. When the number of the packets of a type destined for the Zone hits the threshold,
the system enables defense against such packets. Because improper configurations may affect
normal services, you are advised to learn the dynamic baseline and set a proper defense
threshold according to the learning result.
If the threshold is set to a smaller value, the system enables attack defense even if no
attack occurs.
If the threshold is set to a larger value, the system cannot enable attack defense in a
timely manner.
Therefore, before you configure the threshold, learn about the basic traffic model first.
In dynamic baseline learning, the system learns peak traffic at an interval in the normal
network environment and presents the data in curve to the administrator by using the ATIC.
You are advised to deliver the learning result as the defense threshold, after dynamic baseline
learning is complete. The threshold must be set to a value higher than normal peak traffic.
The dynamic baseline can be learned repeatedly to cope with the changes of network traffic
models.
Prerequisites
The basic policies of the Zone have been configured and deployed on the associated
devices. For details, see 6.2.1 Configuring a Defense Mode.
Devices associated with the Zone have been bound to collectors. For details, see 5.4.2
Associating the Collector with the devices.
Context
Current Threshold indicates the current threshold of a policy; Baseline indicates the traffic
volume learned using baseline learning; Suggestion indicates the recommended threshold
calculated based on the current threshold and baseline. The recommended threshold changes
to the current threshold once being delivered to the device. The recommended threshold is
calculated as follows:
When the defense threshold is configured: recommended threshold = current threshold x
current threshold weight + (baseline value x tolerance value) x (1 - current threshold weight)
Issue 01 (2015-07-20)
62
When the defense threshold is not configured: recommended threshold = baseline value x
tolerance value
Baseline packet rate < 5000 pps, baseline bandwidth < 20 Mbit/s, or baseline connection
count < 5000: tolerance value = 200%
5000 pps baseline packet rate < 30,000 pps, 20 Mbit/s baseline bandwidth < 100
Mbit/s, or 5000 baseline connection count < 30,000: tolerance value = 180%
30,000 pps baseline packet rate < 100,000 pps, 100 Mbit/s baseline bandwidth < 300
Mbit/s, or 30,000 baseline connection count < 100,000: tolerance value = 160%
100,000 pps baseline packet rate < 300,000 pps, 300 Mbit/s baseline bandwidth < 1
Gbit/s, or 100,000 baseline connection count < 300,000: tolerance value = 140%
300,000 pps baseline packet rate < 12,000,000 pps, 1 Gbit/s baseline bandwidth < 10
Gbit/s, or 300,000 baseline connection count < 12,000,000: tolerance value = 120%
False positive occurs due to the threshold that is too low. Therefore, set the packet rate,
bandwidth value, and connection count to 500 pps, 5 Mbit/s, and 500 respectively, when their
recommended values are smaller than given values.
If only one detecting device is in the same defense group, the baseline learning result of the
cleaning device is the same as that of the detecting device. If multiple detecting devices are
available, the baseline learning result of the cleaning device is the same as the maximum
learning result of each detecting device.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click the Zone's state in the Baseline Learning column.
Step 3 Configure a baseline learning task. For parameters, see Table 6-11.
Table 5-11 Parameters of configuring a baseline learning task
Parameter
Description
Learning Cycle
Start Time
Indicates the start time of the current cycle for baseline learning.
Current Threshold
Weight
Take effect
automatically
Issue 01 (2015-07-20)
63
Parameter
Description
results to defense policies after the learning period ends,
regardless of the learning results.
Step 4 Click Startup to enable the baseline learning task of the Zone.
If a service is created, the traffic that matches the service is separately learned, and the traffic
that does not match the service are to be learned as a whole. The learning results are applied
to the defense policies of the created service and the default defense policies. If no service is
created, all traffic is learned as a whole and the learning result is applied to the default defense
policy.
After baseline learning is enabled, click Stop to stop baseline learning.
To modify the parameters of the learning task, stop baseline learning first.
----End
Result
Before the first learning cycle ends, service traffic learning result from the start time to
the current time is displayed. After the first learning period elapses, service traffic
learning result of the last learning cycle is displayed.
After you click
in the Operation column, you can view the traffic trend chart of
baseline learning and change the Current Threshold value.
After Take effect automatically and Always Effective are selected in a baseline
learning task, the system automatically applies the recommended values to defense
policies after the baseline learning period ends.
The baseline learning result takes effect only after the corresponding defense item is enabled in defense
policies.
Follow-up Procedure
When the confirmation mode of baseline learning is automatic, service traffic learning
result is automatically applied to the defense policy of the Zone and deployed on
devices.
When the automatic confirmation mode is not selected for baseline learning, service
traffic learning result needs to be confirmed manually. For details, see 6.2.5.3 Applying
Baseline Learning Results.
Issue 01 (2015-07-20)
64
Prerequisites
The baseline learning task has been enabled. For details, 6.2.5.2 Configuring a Baseline
Learning Task.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click the Zone's state in the Baseline Learning column.
Step 3 In the Dynamic Baseline Result group box, select the check box of a service and click Apply
Suggestion to apply the recommended value in baseline learning results to service policies.
After you click
value.
----End
Prerequisites
The defense mode of the Zone has been configured. For details, see 6.2.1 Configuring a
Defense Mode.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Click
of the Zone.
The name of the default defense policy consists of basic and the IP address of the associated
device. For example, if the IP address of the device is 128.18.60.36, the name of the default
defense policy is basic_128_18_60_36.
Step 4 Configure defense policies for protocols.
----End
Issue 01 (2015-07-20)
65
Block
Discards all TCP packets.
Traffic Limiting
TCP Traffic Limiting: Limits traffic of all TCP packets destined for an IP address
below Threshold.
TCP Fragment Rate Limiting: Limits traffic of all TCP fragments destined for an IP
address below Threshold.
Defense
It is recommended that you configure link status detection to defend against the SYN-ACK flood, ACK
flood, TCP fragment, and FIN/RST flood attacks in the scenario where the incoming and outgoing paths
of packets are consistent.
Description
Value
SYN
Flood
Attack
Defense
Threshold
ACK
Flood
Attack
Defense
Threshold
TCP
Fragmen
t Attack
Issue 01 (2015-07-20)
Threshold
Perform configurations
through baseline learning.
For details, see 6.2.5.2
66
Parameter
Description
Value
Defense
Configuring a Baseline
Learning Task.
FIN/RS
T Flood
Attack
Defense
Threshold
Perform configurations
through baseline learning.
For details, see 6.2.5.2
Configuring a Baseline
Learning Task.
Source
IP
TCP-Rat
io
Anomal
y
Limiting
Rate Limiting
Threshold
Description
Value
You are advised to
perform configurations
through baseline
learning. For details,
see 6.2.5.2
Configuring a Baseline
Learning Task.
Concurrent
connection
check by
destination
IP address
Threshold
New
connection
rate check
by
destination
IP address
Threshold
New
connection
rate check
Issue 01 (2015-07-20)
67
Parameter
Description
by source
IP address
Value
Connectio
n Number
Check for
Source IP
Address
Threshold
Abnormal
Session
Check
Abnormal connection
threshold, Check Cycle
Null
connection
check
Minimum
packets per
connection,
Check
Cycle
Retransmis
sion
session
check
Retransmis
sion Packet
Number
Threshold
Issue 01 (2015-07-20)
68
Parameter
Description
Value
Threshold, the
connection is regarded
as an anomaly one.
Sockstress
TCP
Window
Size
Threshold
Block
Discards all UDP packets.
Traffic Limiting
Limits traffic to defend against attacks when UDP attack packets without features.
UDP Traffic Limiting: Limits traffic of all UDP packets destined for an IP address
below Threshold.
UDP Fragment Rate Limiting Threshold: Limits traffic of all UDP fragments
destined for an IP address below Threshold.
Defense
For parameters, see Table 6-14.
Description
Recommended Value
UDP
Flood
Fingerp
rint
Attack
Defense
Threshold
UDP
Fragme
nt
Threshold
Issue 01 (2015-07-20)
69
Parameter
Description
Recommended Value
Attack
Defense
threshold, UDP
fragment
fingerprint
learning and
payload check
are enabled, and
the UDP
fragments
matching a
specified
fingerprint or
payload are
discarded.
Block
Discards all ICMP packets.
Traffic Limiting
Limits ICMP traffic destined for an IP address below Threshold.
The Threshold is specified based on actual network bandwidths.
Block
Discards all packets of services except the TCP, UDP, ICMP, DNS, SIP, HTTP, and
HTTPS services.
Traffic Limiting
Limits the outbound traffic of the services except the TCP, UDP, ICMP, DNS, SIP, HTTP,
and HTTPS services of a destination IP address below Threshold.
The Threshold is specified based on actual network bandwidths.
Defense
After fingerprint learning is enabled, the packets that match the learned fingerprint,
except those of TCP, UDP, ICMP, DNS, SIP, HTTP, and HTTPS, are discarded.
Issue 01 (2015-07-20)
70
Block
Discards all UDP DNS packets.
Rate Limiting
Defense
Description
Value
DNS
Reque
st
Flood
Attack
Defens
e
Passive: Validity
authentication is performed on
the client that does not support
the sending of DNS requests in
TCP packets.
Defens
e
Mode
Thresh
old
Issue 01 (2015-07-20)
71
Description
Value
DNS
Reque
st
Flood
Attack
Defens
e
Passive: Validity
authentication is performed on
the client that does not support
the sending of DNS requests in
TCP packets.
CNAME: Validity
authentication is performed on
the client that supports the
sending of DNS requests in
TCP packets.
Defens
e
Mode
Thresh
old
If this function is enabled, you must run the anti-ddos server-flow-statistic enable command on the
inbound interface to enable the upstream traffic analysis function.
Packet malformed
After the validity check on packets is enabled, the cleaning device checks DNS
packet formats and discards non-standard packets.
Issue 01 (2015-07-20)
72
Source detection
When defense is enabled and the rate of SIP packets exceeds Threshold, the device
reports anomaly events to the ATIC Management center and starts defense against
SIP packets based on the destination IP address.
You are advised to configure Threshold (pps) based on baseline learning. For details,
see 6.2.5.2 Configuring a Baseline Learning Task.
Block
Discards all HTTP packets.
Traffic Limiting
Limits HTTP traffic destined for an IP address below Threshold. Excess packets are
discarded.
The Threshold is specified based on actual network bandwidths.
Defense
When Statistics Based on Source IP Address is enabled and the rate of HTTP
packets destined for the Zone is greater than Threshold or Request Threshold,
the system enables source IP address-based statistics, and reports anomalies to
the ATIC Management center. When the rate of HTTP packets from the IP
address is larger than Threshold or Request Threshold, the source
authentication of HTTP packets is enabled.
The source-based defense mode can be 302 Redirect or Verify Code.
If the defense mode of the Zone is automatic, the system starts defense
automatically. If the defense mode is manual, the administrator needs to confirm
and start the defense manually. For details on how to configure the defense mode,
see 6.2.1 Configuring a Defense Mode.
You are advised to specify the Threshold or Request Threshold through baseline
learning. For details, see 6.2.5.2 Configuring a Baseline Learning Task.
Issue 01 (2015-07-20)
73
Request Threshold indicates that the device collects statistics on all HTTP packets, including SYN,
SYN-ACK, and ACK packets of TCP connections. Threshold indicates that the device collects statistics
on the HTTP packets (such as GET and POST packets) except SYN, SYN-ACK, and ACK packets. As
long as the traffic volume reaches one of the thresholds, the defense is triggered.
Description
Value
Defense Mode
Proxy
Detection
Issue 01 (2015-07-20)
74
Parameter
Description
Value
SYN
Rate
Limiti
ng
Thres
hold
Thres
hold
The total length of consecutive HTTP post packets exceeds the given value,
but the HTTP payload length is less than the given value.
The headers of consecutive HTTP get/post packets do not have any end flags.
Description
Number of concurrent
connections
Issue 01 (2015-07-20)
75
Parameter
Description
Packet number
Payload length
Description
Value
Desti
nation
IP-bas
ed
URI
Behav
ior
Monit
oring
Detec
tion
Thres
hold
Sourc
e
IP-bas
ed
URI
Behav
ior
Monit
oring
Defen
se
Thres
hold
Closely
monitored URI
Issue 01 (2015-07-20)
Block
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
76
Traffic Limiting
Limits HTTPS traffic destined for an IP address below Threshold.
The Threshold is specified based on actual network bandwidths.
Defense
HTTPS Source Authentication Defense
If the defense mode of the Zone is automatic, the system starts defense
automatically. If the defense mode is manual, the administrator needs to confirm
and start the defense manually. For details on how to configure the defense mode,
see 6.2.1 Configuring a Defense Mode.
You are advised to specify the Threshold through baseline learning. For details, see
6.2.5.2 Configuring a Baseline Learning Task.
After defense against anomaly events is enabled, the cleaning device uses the source authentication
mode for defense.
The source IP address that fails authentication is regarded as the attack source and is reported to the
ATIC Management center. If the dynamic blacklist mode of the Zone is not Close, the ATIC
Management center automatically adds the IP addresses of attack sources to the dynamic blacklist.
For details on how to configure the dynamic blacklist mode, see 6.2.1 Configuring a Defense Mode.
The session is closed after successful authentication. The page needs to be manually refreshed,
which affects user experience.
SSL Defense
After HTTPS source authentication defense is enabled, if the rate of the HTTPS
packets destined for the specified IP address exceeds Threshold, the system
performs SSL checks on the source IP address of the packets. Within the interval
specified in Renegotiation Interval, if the number of SSL negotiations between a
source IP address and a destination IP address exceeds Maximum Renegotiation
Times, the session in between is marked as abnormal. Within the interval specified
in Abnormal Session Check Interval, if the number of abnormal sessions exceeds
the value specified in Maximum Number of Abnormal Sessions, the source IP
address is regarded as abnormal and therefore blacklisted.
Issue 01 (2015-07-20)
77
Description
Usage
HT
TP
lear
ning
HTTP Host
HTTP URI
Top N
HTTP
Source IP
Addresses
(pps/qps)
HT
TPS
lear
ning
DN
S
lear
ning
Top N
HTTPS
Source IP
Addresses
(pps)
Top N
Requested
Domain
Names
Issue 01 (2015-07-20)
78
Top N study
Description
device adds top N domain
names and IP addresses to
the dynamic cache. After
that, the cleaning device
replies to requests for
these DNS domain names
to reduce the load over the
DNS server.
Top N DNS
Request
Source IP
Addresses
(pps)
Top N DNS
Response
Source IP
Addresses
(pps)
TC
P
lear
ning
Top N TCP
Source IP
Addresses
(New
Connection
)
Usage
legitimate traffic after cleaning.
79
Description
SYN
TCP
DNS
UDP
ICMP
Configure first-packet discarding only for the protocols supporting packet retransmission.
Otherwise, normal services will be affected.
Issue 01 (2015-07-20)
80
Context
This configuration is available only on anti-DDoS devices.
Procedure
Step 1 Choose Defense > Policy Settings > Global Policy.
Step 2 Click
Step 3 In the Basic Attack Defense group box, select the check box of an attack type and enable the
attack defense function. For parameters, see Table 6-21.
If Large ICMP Packet or Large UDP Packet is selected, the packet length needs to be
specified. The AntiDDoS discards the ICMP or UDP packet whose length exceeds the value.
Table 5-21 Configuring basic attack defense
Parameter
Description
Fraggle
ICMP
Redirection
Packet
ICMP
Unreachable
Packet
WinNuke
Land
After the Land attack (loopback attack) defense is enabled, the AntiDDoS
checks whether the source and destination addresses of TCP packets are
the same, or the source address of TCP packets is a loopback one. If the
source and destination addresses are the same, the AntiDDoS discards the
packets and logs the attack.
Ping of Death
After the Ping of Death attack defense is enabled, the AntiDDoS checks
whether the packet size is larger than 65,535 bytes. If a packet is larger
than 65,535 bytes, the AntiDDoS discards the packet and logs the attack.
IP Packet with
Route Record
Option
After the IP packet with route record option attack defense is enabled, the
AntiDDoS checks whether the IP route record option is specified in the
received packet. If the IP route record option is specified, the device
discards the packet and logs the attack.
Smurf
After the Smurf attack defense is enabled, the AntiDDoS checks whether
the destination IP address of ICMP request packets is the broadcast
address of category A, B, or C. If the destination IP address is the
Issue 01 (2015-07-20)
81
Parameter
Description
broadcast address of category A, B, or C, the device discards the packet
and logs the attack.
IP Packet with
Source Route
Option
After the IP packet with source route option attack defense is enabled, the
AntiDDoS checks whether the IP source route option is specified in the
received packet. If the IP source route option is specified, the device
discards the packet and logs the attack.
NOTE
In the IP routing technology, the transmission path of an IP packet is determined by
the routers on the network according to the destination address of the packet.
Nevertheless, a method is also provided for the packet sender to determine the
packet transmission path, that is, the source route option. This option means
allowing the source site to specify a route to the destination and replace the routes
specified by intermediate routers. The source route option is generally used for
fault diagnosis of network paths and temporary transmission of some special
services. The IP source route option may be utilized by malicious attackers to probe
the network structure because it neglects the intermediate forwarding processes
through various devices along the packet transmission path, regardless of the
working status of forwarding interfaces.
After the TCP flag bit attack defense is enabled, the AntiDDoS checks
the flag bits (URG, ACK, PSH, RST, SYN, and FIN) of each TCP
packet. In either of the following cases, the device discards the packet
and logs the attack.
Both the SYN bit and the FIN bit are set to 1.
Both the SYN bit and the RST bit are set to 1.
TearDrop
Large ICMP
Packet
After the large ICMP packet attack defense is enabled, the AntiDDoS
discards the ICMP packet whose length exceeds the threshold and logs
the attack.
IP Packet with
Timestamp
Option
After the IP packet with timestamp option attack defense is enabled, the
AntiDDoS checks whether the IP timestamp option is specified in the
received packet. If the IP timestamp option is specified, the device
discards the packet and logs the attack.
Tracert
Large UDP
Packet
After the large UDP packet attack defense is enabled, the AntiDDoS
discards the UDP packet whose length exceeds the threshold and logs the
attack.
Issue 01 (2015-07-20)
82
Step 5 Click
Step 6 In the Deploy dialog box, display the deployment progress. After the deployment is complete,
the dialog box is closed automatically.
----End
Follow-up Procedure
Choose Defense > Policy Settings > Global Policy, select the check box of the device and
click
device to avoid data loss.
Procedure
Step 1 Choose Defense > Policy Settings > Global Policy.
Step 2 Click
Step 4 Click Confirm. The configured blacklist or whitelist entry is displayed in the group box.
Step 5 Click Close.
Step 6 Click
----End
Procedure
Step 1 Choose Defense > Public Settings > IP Location User-Defined.
Step 2 Click
Issue 01 (2015-07-20)
83
Description
Name
Description
IP Address
2.
Click
in the Operation column on the right of a device to access the Modify
Management Protocol window.
3.
SFTP is more secure than FTP. To secure data transmission, use SFTP to transfer files.
Management Operations
Choose Defense > Public Settings > Library File. Manage IP address descriptions.
Depl
oy
Click
Impo
rt
1. Click
.
2. In the Import window, click Browse..., select the library file, and click OK.
The botnet, Trojan horse, and worm library file name must be in the
IPS_H*.zip format. The IP location library file name must be in the
location_sdb*.zip format. The IP reputation library file name must be in the
IPRPU_H*.zip format. And the malicious URL library file must be in the
Issue 01 (2015-07-20)
84
CNC_H*.zip format.
Imported library files are displayed in the library file list.
Expo
rt
Delet
e
NOTE
Only Undeployed library files can be directly deleted. If a library file has been successfully or
partially deployed, it cannot be deleted. To delete a deployed library file, load another library
file of the same type. The newly loaded library file overwrites the deployed one and is in
Undeployed state. Then, you can delete this file.
Sync
hroni
ze
Click
Download the latest library file from the secure cloud center to the ATIC
management center.
Ensure that the secure cloud center and ATIC management center are reachable.
NOTE
The ATIC management center supports automatic database file synchronization and
automatically updates the database file in 4 a.m. every day. After the update is complete, both
the new and old database files exist in the database file list. The ATIC supports a maximum of
40 database files. If there are more than 40 database files, the synchronization fails. You need
to manually delete old database files.
Templates for Web defense protect the Web server. You are advised to use templates of
this type if HTTP or HTTPS servers are deployed on the live network.
Templates for DNS cache defense protect the DNS cache server. You are advised to use
templates of this type if DNS cache servers are deployed on the live network.
Issue 01 (2015-07-20)
85
Templates for DNS authorization defense protect the DNS authorization server. You are
advised to use templates of this type if DNS authorization servers are deployed on the
live network.
Templates for basic defense protect TCP, UDP, and ICMP services on the network. You
are advised to templates of this type if no DNS or Web server is deployed on the live
network.
Description
Create
Click
to create a policy template manually. For details, see
Creating a Policy Template.
NOTE
You can save policy configurations as a template.
Modify
Click
in the Operation column and then the Basic Information
page in the Modify Policy Template dialog box to change the template
name and modify remarks. Click the tab of each defense policy to modify
the defense policy. For parameters, see 6.2.6 Configuring the Zone-based
Defense Policy.
Associate a
Zone
Click
to associate the policy template with the Zone. For details, see
Associating a Zone.
Delete
Query
template
2.
Click
3.
On the Basic Information tab page, configure basic information of the policy template.
Device Type and Protocol define device model and protocol to which this template can
be applied.
If a protocol type is specified, the created policy template applies to service policies; if not, the created
policy template applies to Zone-based policies.
4.
Click the tab of each defense policy and configure the defense policy. For parameters,
see 6.2.6 Configuring the Zone-based Defense Policy.
5.
Click OK.
Associating a Zone
Two methods are available for configuring the policy for the Zone with the policy template:
Issue 01 (2015-07-20)
86
2.
Click
3.
4.
On the Select Zone page, select the Zone to be associated and click OK.
5.
2.
Click
Operation
Parameter
Description
Cloud Clean
Configure
Service Provider
Cleaning mode
IP abnormal state
Single IP traffic
threshold
Issue 01 (2015-07-20)
CTCC
HW
87
Operation
Parameter
Description
IP inflow TOPN
Device
Threshold
Parameter settings
Defense action
Supported only by HW
Clean
Block
Automatic releasing
time
URL
Access key
3.
Click OK.
4.
After the configuration is complete, if the incoming traffic exceeds the threshold, the
cloud cleaning policy is automatically triggered.
You can also manually implement the cloud cleaning policy by selecting the check box
of the cloud cleaning policy in Cloud Clean Policy List and clicking
the list.
above
Parameter
Description
Service provider
Issue 01 (2015-07-20)
88
Parameter
Description
IP/Mask
Defense Action
Range of Defense
Supported only by HW
Clean
Block
Manually added cloud cleaning policies cannot be automatically cleared. You need to
manually delete them from the Cloud Clean Policy List.
2.
Click OK.
Prerequisites
The basic policies of the Zone have been configured. For details, see 6.2.1 Configuring a
Defense Mode.
Context
The SIG does not support policy deployment. By synchronizing data from the ATIC
Management center periodically, the SIG automatically obtains the configuration data.
ATIC Management center supports incremental deployment. If Deployment State of a Zone
is in Undeployed or Part Deployed state, a defense policy in the system is not delivered to
devices. You need to deliver the defense policy.
Issue 01 (2015-07-20)
89
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Select the check box of the Zone and click
Step 3 In the Information dialog box, click OK to display the deployment progress. After the
deployment is complete, the dialog box is closed automatically.
If the deployment fails, Deployment State of the Zone is displayed as Deploy Failed.
Click Deploy Failed to view details about deployment failures on devices associated
with the Zone.
----End
Step 3 In the OK dialog box, click OK. The saving progress is displayed. After the saving is
complete, the dialog box is automatically closed.
----End
Issue 01 (2015-07-20)
90
Mirroring, packets received or sent by a port (mirroring port) are copied to a specified port
(observing port) and then are issued to the detecting device. By analyzing packets captured by
the detecting device, you can learn data transmitted over the mirroring port.
Issue 01 (2015-07-20)
91
As shown in Figure 7-1, the detecting device is directly connected to GE1/0/1 on Router1,
which uses interfaces as mirroring and observing ports. Inbound traffic of GE1/0/0 is copied
to GE1/0/1 through the port mirroring, and then is issued to the detecting device for analysis.
Mirroring and traffic-diversion routers can be the same router or different ones.
Figure 6-1 Mirroring
This mode applies to enterprise networks because of low costs and no extra device or
component; however, this mode requires CLI configurations on the router.
To enable traffic copying in mirroring mode, only configure CLIs related to port mirroring on
the router. The following uses Huawei NE80E as an example for describing how to configure
port mirroring on the router.
Step 1 Configure the local observing port.
1.
2.
3.
Issue 01 (2015-07-20)
92
When the physical port serves as the observing port, the index number of the observing
port must be identical with the slot number of the LPU where the interface resides. When
the logical interface serves as the observing port, the index number cannot be used by
another observing port.
4.
Step 2 Configure the observing port for the mirroring of the entire LPU.
1.
2.
3.
2.
----End
Implementation Mechanism
A policy-based route is generally applicable to static traffic-diversion. As shown in Figure 7-2,
a traffic-diversion channel is established between GE1/0/1 on Router1 and GE2/0/1 (cleaning
interface) on the cleaning device. Apply a policy-based route to inbound interface GE1/0/0 on
Router1. In this way, the packets meeting conditions are forwarded to the cleaning device
through GE1/0/1, instead of the routing table. Therefore, traffic destined for the Zone is
forcibly diverted.
Issue 01 (2015-07-20)
93
2.
Configure the ACL to define the data flow matching the policy-based route.
3.
Run the traffic classifier classifier-name command in the system view to define a
traffic classifier and access the traffic classifier view.
classifier-name specifies the name of a traffic classifier. It is a string of 1 to 31
characters, case sensitive.
b.
Run the if-match [ ipv6 ] acl { acl-number | name acl-name } command to define
an ACL rule.
acl-number specifies the number of the ACL. The value is an integer.
For IPv4 packets, the value ranges from 2000 to 4099.
Issue 01 (2015-07-20)
94
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
Run the following commands to define a traffic behavior and set an action accordingly.
a.
Run the traffic behavior behavior-name command in the system view to define a
traffic behavior and access the traffic behavior view.
behavior-name: specifies the name of a traffic behavior. The value is a string of 1 to
31 characters.
b.
5.
Run the following commands to define a traffic policy and specify a behavior for the
classifier in the policy.
a.
Run the traffic policy policy-name command in the system view to define a traffic
policy and access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31
characters.
b.
6.
Run the following commands to apply the policy-based route to the interface.
a.
b.
Run the traffic policy policy-name inbound command to apply the policy-based
route.
inbound applies the traffic policy to the inbound direction.
Issue 01 (2015-07-20)
95
Implementation Mechanism
As shown in Figure 7-3, a traffic-diversion channel is established between GE1/0/1 on
Router1 and GE2/0/1 of the cleaning device, on which GE2/0/1 serves as the cleaning
interface and GE2/0/2 as the traffic-injection interface. After a traffic-diversion task is
configured, a 32-bit static host route is generated on the cleaning device. In this case,
configure BGP on both the cleaning device and the Router1 to import the UNR route to BGP.
Then BGP advertises the UNR route to Router1.
Figure 6-3 BGP traffic diversion
The following uses automatic traffic diversion and Zone 1.1.1.1/32 as an example for
illustrating the implementation mechanism of BGP traffic diversion:
1.
When the traffic destined for Zone 1.1.1.1/32 becomes abnormal, the ATIC Management
center automatically delivers a traffic-diversion task to the cleaning device. Subsequently,
a 32-bit static host route is generated on the cleaning device. The destination IP address
of the UNR route is 1.1.1.1/32 and the next hop is GE1/0/2 on Router1 directly
connected to the traffic-diversion interface on the cleaning device.
2.
A BGP peer is established between GE2/0/1 on the cleaning device and GE1/0/1 on
Router1. The cleaning device advertises the generated UNR route to Router1 through
BGP.
3.
After a UNR route reaches Router1, the destination IP address is still 1.1.1.1/32 but the
outbound interface points to GE2/0/1 on the cleaning device.
4.
After receiving packets destined for 1.1.1.1/32, Router1 searches the routing table to
send packets to the GE2/0/1 interface on the cleaning device by using its GE1/0/1
according to the longest mask match to implement traffic diversion.
In the previous mechanism, the 32-bit static host route on the cleaning device takes effect
only if configured through the CLI and ATIC Management center. Perform the following:
Issue 01 (2015-07-20)
96
1.
Run the firewall ddos bgp-next-hop { ip-address | ipv6 ipv6-address } command on the
cleaning device to configure the next-hop address, that is, the IP of GE1/0/2 on Router1
directly connected to the traffic-injection interface on the cleaning device, for generating
a route.
2.
On the ATIC Management center GUI, select a traffic-diversion mode for the Zone to
dynamically generate a traffic-diversion task. For details, see 6.2.1 Configuring a
Defense Mode. Alternatively, create a static traffic-diversion task. For details, see 7.2.3
Configuring BGP Traffic Diversion (ATIC).
After the generated traffic-diversion task is delivered to the cleaning device, the system
displays the corresponding command, that is, firewall ddos traffic-diversion
[ vpn-instance vpn-instance-name ] ip ip-address [ mask | mask-length ] [ ip-link name ]
or firewall ddos traffic-diversion [ vpn6-instance vpn6-instance-name ] ipv6
ipv6-address [ mask-length ].
After previous two steps are complete, a UNR route is generated on the cleaning device. For
example, the automatic traffic-diversion mode is configured for Zone 1.1.1.1/32 in the ATIC
Management center and the firewall ddos bgp-next-hop 2.2.2.2 command is configured on
the cleaning device. When the detecting device detects abnormal upon 1.1.1.1/32, a UNR
route with destination IP address 1.1.1.1/32 and next hop 2.2.2.2 is generated on the cleaning
device.
The generated UNR route delivers the traffic injection function. With this UNR route, the
cleaned traffic is injected to GE1/0/2 on Router1. To avoid loops, that is, the cleaned traffic is
sent to the cleaning device through Router1, configure a policy-based route on GE1/0/2. With
the policy-based route, traffic is sent to downstream Router2 and then the Zone.
In certain scenarios such as multiple traffic-diversion links, you need to filter the UNR route
generated by the cleaning device to prevent the route from being delivered to the FIB and
interfering with injected traffic. Meanwhile, configure other traffic-injection policy to inject
the traffic to the original link.
Run the following command on the cleaning device to filter the UNR route:
[sysname] firewall ddos bgp-next-hop fib-filter [ ipv6 ]
When static traffic injection is adopted, and the cleaning device forwards traffic to the
access router based on the generated UNR route, do not configure the command.
When static route traffic injection is adopted, to prevent the generated UNR route from
affecting static route forwarding, configure the command.
When GRE traffic injection is adopted, to prevent the generated UNR route from
affecting GRE forwarding, configure the command.
When MPLS LSP traffic injection is adopted, to prevent the generated UNR route from
affecting MPLS forwarding, configure the command.
When MPLS VPN traffic injection is adopted, to prevent the generated UNR route from
affecting MPLS forwarding, configure the command.
When multiple traffic-injection links exist and the cleaning device learns the route to the
Zone through routing protocols such as OSPF, to prevent the generated UNR route from
affecting OSPF forwarding, configure the command.
Issue 01 (2015-07-20)
97
1.
Run the system-view command in the user view to access the system view.
2.
3.
(Optional) Run the firewall ddos bgp-next-hop fib-filter [ ipv6 ] command to perform
FIB filtering over the generated UNR route.
After this command is configured, the dynamically generated UNR route cannot be
delivered to the FIB.
4.
(Optional) Run the following commands to configure the BGP group attribute.
Configure the BGP group attribute according to the networking. In normal cases, to avoid loops, you are
advised to configure the filtering policy.
a.
b.
c.
d.
5.
e.
Run the ipv4-family unicast command to access the IPv4 unicast address family
view.
f.
g.
Run the following commands to configure BGP to advertise the dynamically generated
route.
a.
b.
c.
Run the peer ip-address as-number as-number command to set an IP address for
the BGP peer and the number of the AS to which the BGP peer belongs.
The specified as-number must be the same as the local AS number.
ipv4-address specifies the IP address of the interface directly connected to the BGP
peer, that is, that of GE1/0/1 directly connected Router1.
d.
Issue 01 (2015-07-20)
98
After this command is configured, the system imports the generated UNR route to
BGP and advertises the route to the router through BGP, implementing traffic
diversion.
Task Example
As shown in Figure 7-4, the detecting device and cleaning device are deployed on the network
in off-line mode to detect and clean the traffic destined for the Zone. BGP traffic diversion is
configured on the cleaning device. When identifying anomalies, the detecting device reports
exception logs to the ATIC management center, who then automatically delivers a
traffic-diversion policy to the cleaning device to divert all traffic to the cleaning device.
Consequently, the cleaning device cleans diverted traffic and injects normal traffic to the
original link.
Figure 6-4 Example for configuring BGP traffic diversion
Assume that a Zone is at 2.2.2.0/24. When the traffic destined for 2.2.2.2/32 is abnormal,
perform the following to automatically divert such traffic to the cleaning device for cleaning:
1.
On the cleaning device, configure the next-hop address for dynamically generating a
route.
<sysname> system-view
[sysname] firewall ddos bgp-next-hop 7.7.2.2
7.7.2.2 indicates the IP address of GE1/0/2 on the router directly connected to the
traffic-injection interface on the cleaning device.
2.
In the ATIC Management center, Choose Defense > Policy Settings > Zone and set the
IP address of the Zone to 2.2.2.0/24.
3.
In the ATIC Management center, Choose Defense > Policy Settings > Zone and set the
traffic-diversion mode for the Zone to Automatic.
Issue 01 (2015-07-20)
99
4.
When the traffic destined for Zone 2.2.2.2/32 becomes abnormal, the ATIC management
center automatically delivers a traffic-diversion task to the cleaning device. Then the
cleaning device generates a UNR route with next hop 7.7.2.2 to 2.2.2.2 and delivers the
route to the FIB. Cleaned traffic is forwarded to GE1/0/2 on Router1 after matching the
entry.
When you employ the MPLS or GRE traffic-diversion mode, run the firewall ddos
bgp-next-hop fib-filter command to disable the generated UNR route from being
delivered to the FIB, ensuring in-service MPLS or GRE forwarding.
5.
Configure the BGP community attribute and advertise the dynamically generated route.
[sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname] bgp 100
[sysname-bgp] peer 7.7.1.2 as-number 100
[sysname-bgp] import-route unr
[sysname-bgp] ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
[sysname-bgp-af-ipv4] peer 7.7.1.2 advertise-community
[sysname-bgp-af-ipv4] quit
[sysname-bgp] quit
After previous configurations are complete, the system imports the generated UNR route
to BGP and advertises the route to Router1 through BGP, implementing traffic diversion.
2.
3.
Run the peer ipv4-address as-number as-number command to set an IP address for the
BGP peer and the number of the AS to which the BGP peer belongs.
The specified as-number AS number can be EBGP or IBGP.
ipv4-address specifies the IP address of the interface directly connected to the BGP peer,
that is, that of GE2/0/1 on the cleaning device.
Issue 01 (2015-07-20)
100
The static traffic diversion task needs to be created by the administrator. For details, see
Creating a Static Traffic Diversion Task.
After the traffic diversion task is delivered to the cleaning device, the firewall ddos
traffic-diversion [ vpn-instance vpn-instance-name ] ip ip-address [ mask | mask-length ]
command is generated on the cleaning device. This command works with other commands to
realize BGP traffic diversion.
After the anomaly or attack ends, the diversion persists for a while before it is automatically
canceled to ensure that the anomaly or attack traffic is thoroughly cleaned. For how to set the
persistence time for traffic diversion, see 10.2.4 Maintaining Anti-DDoS Data.
Management Operation
Choose Defense > Policy Settings > Traffic Diversion, manage traffic diversion tasks.
Create
Click
to create a static traffic diversion task in the ATIC
Management center. For details, see Creating a Static Traffic Diversion Task.
Delete
Select the check box of the traffic diversion task to be deleted and click
to delete the task.
Enable
The traffic diversion task in the enabled state is delivered to the cleaning
device. Only the traffic diversion task delivered to the cleaning device takes
effect. Perform the following operations:
Select the check box of the traffic diversion task to be enabled and click
.
Disable
The traffic diversion task in the disabled state does not take effect. Perform
the following operations:
Select the check box of the traffic diversion task to be disabled and click
Issue 01 (2015-07-20)
101
.
Search
Basic Search
In the search area, select Device and Zone as search conditions, and then
click
Advanced Search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions
such as Device, Zone, IP Address, Start Time, End Time, Mode,
Status, or Detail and then click Search.
You can Choose Defense > Policy Settings > Zone and click the corresponding diversion state of the
Zone in the Diversion State column to manage the diversion tasks of the Zone on the Traffic Diversion
Task List tab page
If the IP address for traffic diversion is in a user-defined Zone but you do not know the
actual IP address or IP address segment, select Select IP Address in Input Mode. Then
select the IPv4 address or IPv6 address for traffic diversion.
If you need to specify certain IP addresses or IP address segments for traffic diversion in
a protected IP address segment, you can split the IP address segment and select the
subnet after splitting.
a.
Click
b.
Enter the mask splitting length on the Splitting Setting page and click Split.
The mask splitting length of an IP address segment ranges from 1+number of mask
bits to 8+number of mask bits. For example, the mask of a protected IP address
segment is 255.255.0.0. That is, the number of mask bits is 16. In this case, the
mask splitting length ranges from 17 to 24.
Issue 01 (2015-07-20)
c.
d.
Click OK.
e.
On the Create Traffic Diversion Task page, select subnet IP addresses after
splitting.
If the IP address for traffic diversion is in a default Zone or you know the actual IP
address or IP address segment in a user-defined Zone, select Enter IP Address in Input
Mode. Then enter the actual IP address and subnet mask.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
102
If you need to specify certain IP addresses or IP address segments for traffic diversion in
a protected IP address segment, you can split the IP address segment and select the
subnet after splitting.
a.
b.
Enter the mask splitting length in Mask splitting length and click Split.
The mask splitting length of an IP address segment ranges from 1+number of mask
bits to 8+number of mask bits. For example, the mask of a protected IP address
segment is 255.255.0.0. That is, the number of mask bits is 16. In this case, the
mask splitting length ranges from 17 to 24.
c.
Step 6 Optional: Select Automatic Enabling. The static traffic diversion task is automatically
enabled after it is created.
Step 7 On the Create Traffic Diversion Task page, click OK.
After a traffic diversion task is successfully created, the task is displayed on the Traffic
Diversion Task List page.
----End
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-5, the E1/1 interface on the core switch is directly connected to
interface GE1/0/1 on the cleaning device. The channel between them is for both traffic
diversion and traffic injection. Two VLANs such as VLAN1 and VLAN2 are created on the
switch. Two subinterfaces on the cleaning device are associated with VLAN1 and VLAN2 for
traffic diversion and injection respectively. Traffic is diverted to the cleaning device for
cleaning over VLAN1 of the core switch. After cleaning is complete, the cleaning device
requests the MAC address of the Zone by sending an ARP request packet. Then the Zone
replies with an ARP reply packet. Subsequently, the cleaning device injects traffic to the Zone
based on the MAC address over layer 2.
Issue 01 (2015-07-20)
103
Layer 2 injection is applicable to the scenario where only the Layer 2 forwarding device exists
between the core switch and the Zone.
2.
3.
Run the vlan-type dot1q vlan-id command to set the encapsulation type and VLAN ID
of the sub-interface.
By default, a sub-interface is not encapsulated with 802.1Q and is not associated with
any VLAN.
4.
2.
Issue 01 (2015-07-20)
104
3.
4.
5.
6.
Run the port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] } & <1-10> | all }
command to configure the VLANs that are permitted by the trunk interface.
7.
8.
9.
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-6, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 on the cleaning device through Router1 GE1/0/1 for cleaning. After the
cleaning is complete, the cleaning device injects the cleaned traffic to GE1/0/2 on Router1
along the static route. Subsequently, Router1 forwards the traffic to the Zone.
In practice, the traffic-injection router can be either Router1 or another downstream router
(such as Router2).
Figure 6-6 static route injection
Issue 01 (2015-07-20)
105
Router1 learns the UNR route advertised by the cleaning device and uses the cleaning device
as the next hop of the route to the Zone. In this way, after cleaned traffic is injected to Router1,
Router1 forwards the traffic to the cleaning device according to the routing table. This arises a
loop. To avoid such a loop, configure a policy-based route on inbound interface GE1/0/2 of
Router1 to send injected traffic to downstream Router2 for forwarding.
As the simplest traffic injection mode, static route injection is generally applicable to the
scenario where only one traffic-injection link exists.
2.
Configure the ACL to define the data flow matching the policy-based route.
3.
Run the traffic classifier classifier-name command in the system view to define a
traffic classifier and access the traffic classifier view.
classifier-name specifies the name of a traffic classifier. It is a string of 1 to 31
characters, case sensitive.
b.
Run the if-match [ ipv6 ] acl { acl-number | name acl-name } command to define
an ACL rule.
acl-number specifies the number of the ACL. The value is an integer.
For IPv4 packets, the value ranges from 2000 to 4099.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
Issue 01 (2015-07-20)
106
Run the following commands to define a traffic behavior and set an action accordingly.
a.
Run the traffic behavior behavior-name command in the system view to define a
traffic behavior and access the traffic behavior view.
behavior-name: specifies the name of a traffic behavior. The value is a string of 1 to
31 characters.
b.
5.
Run the following commands to define a traffic policy and specify a behavior for the
classifier in the policy.
a.
Run the traffic policy policy-name command in the system view to define a traffic
policy and access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31
characters.
b.
6.
Run the following commands to apply the policy-based route to the interface.
a.
b.
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-7, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 on the cleaning device through Router1 GE1/0/1 for cleaning. After the
Issue 01 (2015-07-20)
107
cleaning is complete, the cleaning device injects the cleaned traffic to GE1/0/2 on Router1
along the UNR route. Subsequently, Router1 forwards the traffic to the Zone.
In practice, the traffic-injection router can be either Router1 or another downstream router
(such as Router2).
Figure 6-7 UNR route injection
In BGP traffic diversion, Router1 learns the UNR route advertised by the cleaning device and
uses the cleaning device as the next hop of the route to the Zone. In this way, after cleaned
traffic is injected to Router1, Router1 forwards the traffic to the cleaning device according to
the routing table. This arises a loop. To avoid such a loop, configure a policy-based route on
inbound interface GE1/0/2 of Router1 to send injected traffic to downstream Router2 for
forwarding.
When BGP traffic diversion is employed, you need to only specify an IP address for the Zone
whose traffic is to be diverted on the ATIC Management center. Then the setting is delivered
to the cleaning device. In this way, a UNR route is automatically generated on the cleaning
device. For details on the implementation mechanism, see 7.2.2 Configuring BGP Traffic
Diversion (CLI). 7.2.3 Configuring BGP Traffic Diversion (ATIC) shows the configuration
procedure.
2.
Configure the ACL to define the data flow matching the policy-based route.
3.
Issue 01 (2015-07-20)
Run the traffic classifier classifier-name command in the system view to define a
traffic classifier and access the traffic classifier view.
108
Run the if-match [ ipv6 ] acl { acl-number | name acl-name } command to define
an ACL rule.
acl-number specifies the number of the ACL. The value is an integer.
For IPv4 packets, the value ranges from 2000 to 4099.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
Run the following commands to define a traffic behavior and set an action accordingly.
a.
Run the traffic behavior behavior-name command in the system view to define a
traffic behavior and access the traffic behavior view.
behavior-name: specifies the name of a traffic behavior. The value is a string of 1 to
31 characters.
b.
5.
Run the following commands to define a traffic policy and specify a behavior for the
classifier in the policy.
a.
Run the traffic policy policy-name command in the system view to define a traffic
policy and access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31
characters.
b.
6.
Run the following commands to apply the policy-based route to the interface.
a.
Issue 01 (2015-07-20)
109
b.
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-8, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 on the cleaning device through Router1 GE1/0/1 for cleaning. After the
cleaning is complete, normal traffic is injected to the original link through the policy-based
route.
In BGP traffic diversion, Router1 learns the UNR route advertised by the cleaning device
and uses the cleaning device as the next hop of the route to the Zone. In this way, after
cleaned traffic is injected to Router1, Router1 forwards the traffic to the cleaning device
according to the routing table. This arises a loop. To avoid such a loop, configure a
policy-based route on inbound interface GE1/0/2 of Router1 to send injected traffic to
downstream Router2 or Router3 for forwarding.
Assume that the traffic is diverted to the cleaning device through BGP. The procedure is
as follows:
a.
Apply the policy-based route to inbound interface GE2/0/1 on the cleaning device
to inject the traffic of different Zones to Router1 GE1/0/2 and GE1/0/3 respectively.
b.
In policy-based route diversion, no loop exists between Router1 and the cleaning device.
Therefore, you need to only apply the policy-based route to the cleaning device.
Assume that the traffic is diverted to the cleaning device through the policy-based route.
The procedure is as follows:
a.
Apply the policy-based route to inbound interface GE2/0/1 on the cleaning device
to inject the traffic of different Zones to different interfaces on Router1.
b.
The injected traffic is sent to Router2 or Router3 according to the routing table after
reaching Router1. Subsequently, the traffic is issued to the Zone.
In practice, the traffic-injection router can be either Router1 or another downstream router
(such as Router2).
Issue 01 (2015-07-20)
110
2.
In the system view, create a PBR policy and access its view.
policy-based-route
3.
4.
Set the matching conditions of the PBR rule. Either the source security zone or incoming
interface must be specified as the matching condition. If you specify both, the latest
configuration overwrites the previous configuration. The source IP address, destination
IP address, service type, application type, and user are optional. You can select them as
required.
Matching Condition
Command
source-zone zone-name&<1-6>
ingress-interface { interface-type
Issue 01 (2015-07-20)
111
Matching Condition
Command
interface-number }&<1-6>
NOTE
Apart from physical interfaces, the AntiDDoS
supports four types of logical interface as the
incoming interface, namely, the VLANIF
interface, Ethernet subinterface, Eth-Trunk
interface, and loopback interface.
Source IP address
source-address { address-set
address-set-name &<1-6> | ipv4-address
[ ipv4-mask-length | mask mask-address ] |
ipv6-address ipv6-prefix-length | range
{ ipv4-start-address ipv4-end-address |
ipv6-start-address ipv6-end-address } |
mac-address &<1-6> | isp isp-name |
domain-set domain-set-name &<1-6> |
any }
Destination IP address
destination-address { address-set
address-set-name &<1-6> | ipv4-address
[ ipv4-mask-length | mask mask-address ] |
ipv6-address ipv6-prefix-length | range
{ ipv4-start-address ipv4-end-address |
ipv6-start-address ipv6-end-address } |
mac-address &<1-6> | isp isp-name |
domain-set domain-set-name &<1-6> |
any }
Service type
Application type
5.
6.
Issue 01 (2015-07-20)
Optional: Enable PBR to interwork with IP-link or BFD and enable the AntiDDoS to
determine the validity of PBR based on IP-link or BFD status.
112
Before you enable PBR to interwork with BFD, create BFD sessions.
If IP-link or BFD is configured and detects that the next hop is unreachable, the
AntiDDoS forwards the packet based on the route table.
2.
Configure the ACL to define the data flow matching the policy-based route.
3.
Run the traffic classifier classifier-name command in the system view to define a
traffic classifier and access the traffic classifier view.
classifier-name specifies the name of a traffic classifier. It is a string of 1 to 31
characters, case sensitive.
b.
Run the if-match [ ipv6 ] acl { acl-number | name acl-name } command to define
an ACL rule.
acl-number specifies the number of the ACL. The value is an integer.
For IPv4 packets, the value ranges from 2000 to 4099.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
Run the following commands to define a traffic behavior and set an action accordingly.
a.
Run the traffic behavior behavior-name command in the system view to define a
traffic behavior and access the traffic behavior view.
behavior-name: specifies the name of a traffic behavior. The value is a string of 1 to
31 characters.
b.
5.
Issue 01 (2015-07-20)
Run the following commands to define a traffic policy and specify a behavior for the
classifier in the policy.
113
a.
Run the traffic policy policy-name command in the system view to define a traffic
policy and access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31
characters.
b.
6.
Run the following commands to apply the policy-based route to the interface.
a.
b.
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-9, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 through Router1 GE1/0/1 for cleaning.
Router2 is a traffic-injection router. A GRE tunnel is established between the cleaning device
and Router2. Tunnel interfaces are created on them respectively, and the source and
destination IP addresses of tunnel interfaces are specified. The source IP address of the tunnel
interface is the IP address of the actual interface for sending packets, and the destination IP
address is the IP address of the actual interface for receiving packets. Cleaned traffic is
forwarded to Router2 over the GRE tunnel and is finally to the Zone.
The source IP address and destination IP address must be routable.
In practice, the traffic-injection router can be either Router2 or another downstream router.
Issue 01 (2015-07-20)
114
In the BGP traffic-diversion scenario, GRE traffic injection directly issues injected traffic to
the downstream router that cannot learn the traffic-diversion route, avoiding loops.
Because GRE traffic injection demands the router to be equipped with GRE and basic route
forwarding functions, it is applicable to the scenario where few traffic-injection routers are
available. In the scenario where multiple GRE tunnels need to be established between the
cleaning device and traffic-injection routers, you are advised to configure dynamic route
injection, because configuring static routes are complex.
Traffic injection is applied unidirectionally to post-cleaning traffic. Therefore, it does not support the
TCP proxy.
When you configure GRE injection, do not configure the keepalive command at both ends of the
tunnel.
Run the system-view command in the user view to access the system view.
2.
Run the interface tunnel tunnel-number command to create a tunnel interface and
access the tunnel interface view.
3.
Run the tunnel-protocol gre command to set the encapsulation mode of the tunnel
interface to GRE.
4.
Issue 01 (2015-07-20)
115
Run the destination dest-ip-address command to set the destination IP address of the
tunnel interface.
The destination IP address of the tunnel interface must be different from its source IP
address.
The specified destination IP address is the IP address of the interface on Router2.
6.
Run the ip address ip-address { mask | mask-length } command to set the IP address of
the tunnel interface.
The IP address of the tunnel interface can be specified as any IP address. When the route
that marks packets forwarded by the tunnel interface is generated through the dynamic
routing protocol, the IP addresses of the interfaces at both ends of the GRE tunnel must
reside on the same network segment.
7.
Run the firewall zone [ name ] zone-name command in the system view to access the
security zone view.
8.
Run the add interface tunnel tunnel-number command to add the tunnel interface to the
security zone.
The tunnel interface can be added to any security zone. When the tunnel interface and
the interface to which the source IP address belongs are not in the same security zone,
configure interzone packet filtering to enable communication between two security
zones.
9.
Configure PBR on the cleaning device and sent the diversion traffic to the tunnel
interface for forwarding. In this way, cleaned traffic can enter the GRE tunnel and be
forwarded to the correct GRE tunnel destination.
Run the system-view command in the user view to access the system view.
2.
Run the interface tunnel tunnel-number command to create a tunnel interface and
access the tunnel interface view.
3.
Run the tunnel-protocol gre command to set the encapsulation mode of the tunnel
interface to GRE.
4.
5.
Run the destination dest-ip-address command to set the destination IP address of the
tunnel interface.
The destination IP address of the tunnel interface must be different from its source IP
address.
The specified destination IP address can be the IP address or loopback address of the
traffic-injection interface on the cleaning device.
Issue 01 (2015-07-20)
116
6.
Run the ip address ip-address { mask | mask-length } command to set the IP address of
the tunnel interface.
The IP address of the tunnel interface can be specified as any IP address. When the route
that marks packets forwarded by the tunnel interface is generated through the dynamic
routing protocol, the IP addresses of the interfaces at both ends of the GRE tunnel must
reside on the same network segment.
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-10, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 through Router1 GE1/0/1 for cleaning.
MPLS and LDP are configured respectively on the cleaning device, Router1, and Router2,
MPLS labels are tagged, and MPLS LSP is established. In this regard, cleaned traffic is
tagged with single-layer labels on the cleaning device, and is injected to the original link
based on the pre-defined LSP. This avoids the traffic-diversion route advertised by the
cleaning device.
In practice, the traffic-injection router can be either Router2 or another downstream router.
Figure 6-10 MPLS LSP traffic injection
Issue 01 (2015-07-20)
117
In the BGP traffic-diversion scenario, MPLS LSP traffic injection can evade the
traffic-diversion route to directly issue injected traffic to the downstream router that cannot
learn the traffic-diversion route, avoiding loops.
As typical dynamic traffic injection, MPLS LSP traffic injection delivers flexible applications
and sound scalability, but demands MPLS supported by routers.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
6.
7.
8.
9.
2.
Run the lsp-trigger all command to configure a policy for establishing an LSP.
3.
----End
Configuring Router1
The following uses Huawei NE80E as an example for describing how to configure Router1 in
MPLS LSP traffic injection.
Issue 01 (2015-07-20)
118
Step 1 Set the IP address of the Router1 interface and loopback address serving as the LSR ID. Use
OSPF to notify the network segment connected to each interface and the host route of the
LSR ID.
Step 2 Configure basic MPLS functions.
1.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
6.
7.
8.
9.
Configuring Router2
The following uses Huawei NE80E as an example for describing how to configure Router2 in
MPLS LSP traffic injection.
Step 1 Set the IP address of the Router2 interface and loopback address serving as the LSR ID. Use
OSPF to notify the network segment connected to each interface and the host route of the
LSR ID.
Step 2 Configure basic MPLS functions.
1.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
Issue 01 (2015-07-20)
119
6.
7.
8.
9.
2.
Run the lsp-trigger all command to configure a policy for establishing an LSP.
3.
----End
Implementation Mechanism
This function is configured on the AntiDDoS.
As shown in Figure 7-11, Router1 is a traffic-diversion router. A traffic-diversion channel is
established between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic
is diverted to GE2/0/1 through Router1 GE1/0/1 for cleaning.
A Layer-3 MPLS VPN is established between the cleaning device and Router2. The cleaning
device acts as an ingress Provider Edge (PE) device, Router1 as a P device, and Router2 as an
egress PE device. Cleaned traffic is injected through GE2/0/2 to GE1/0/1 on Router2 along
the dynamically established Label Switched Path (LSP). Cleaned traffic is tagged with two
layers of labels and outer labels are stripped after the traffic passes through Router1. Then
Router2 searches the corresponding private routing table based on inner private labels to
forward the traffic to the Zone.
In practice, the traffic-injection router can be either Router2 or another downstream router.
Issue 01 (2015-07-20)
120
In the BGP traffic-diversion scenario, MPLS VPN traffic injection directly issues injected
traffic to the downstream router that cannot learn the traffic-diversion route, avoiding loops.
As typical dynamic traffic injection, MPLS VPN traffic injection delivers flexible applications
and sound scalability, but demands MPLS supported by routers.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
6.
7.
Issue 01 (2015-07-20)
121
The interface type can be 10GE, GigabitEthernet, POS, Eth-Trunk, IP-Trunk, or the
subinterface of 10GE, GigabitEthernet, or Eth-Trunk. However, it cannot be
GigabitEthernet 0/0/0 on the MPU.
The interface indicates GE2/0/2 on the cleaning device.
8.
9.
2.
3.
4.
5.
After the ip binding vpn-instance command is configured, Layer-3 features such as the
specified IP address and routing protocol are deleted on the interface. Re-configure them if
desired.
6.
Run the ip address ip-address { mask | mask-length } [ sub ] command to set the IP
address of the interface.
7.
2.
Run the ip address ip-address { mask | mask-length } [ sub ] command to set the IP
address of the loopback interface.
3.
Issue 01 (2015-07-20)
122
4.
5.
Run the peer peer-address as-number as-number command to set the remote PE device
to the peer.
peer-address specifies the IP address of the peer.
6.
7.
Run the ipv4-family vpnv4 [ unicast ] command to access the BGP-VPNv4 subaddress
family view.
8.
Run the peer peer-address enable command to enable VPN-IPv4 route exchange.
Step 5 Configure a route between the PE device and the Customer Edge (CE) device.
In practice, configure EBGP, static route, RIP, or OSPF between the PE device and the CE
device.
----End
Configuring Router1
The following uses Huawei NE80E as an example for describing how to configure Router1 in
MPLS VPN traffic injection.
Step 1 Set the IP address of the Router1 interface and loopback address serving as the LSR ID. Use
OSPF to notify the network segment connected to each interface and the host route of the
LSR ID.
Step 2 Configure basic MPLS functions.
1.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
6.
7.
8.
9.
Issue 01 (2015-07-20)
123
Configuring Router2
The following uses Huawei NE80E as an example for describing how to configure Router2 in
MPLS VPN traffic injection.
Step 1 Set the IP address of the Router2 interface and loopback address serving as the LSR ID. Use
OSPF to notify the network segment connected to each interface and the host route of the
LSR ID.
Step 2 Configure basic MPLS functions.
1.
Run the system-view command in the user view to access the system view.
2.
3.
Run the mpls command to enable global MPLS and access the MPLS view.
4.
5.
Run the mpls ldp command to enable global LDP and access the MPLS-LDP view.
6.
7.
8.
9.
2.
3.
Issue 01 (2015-07-20)
124
4.
5.
After the ip binding vpn-instance command is configured, Layer-3 features such as the
specified IP address and routing protocol are deleted on the interface. Re-configure them if
desired.
6.
2.
Run the ip address ip-address { mask | mask-length } [ sub ] command to set the IP
address of the loopback interface.
3.
4.
5.
Run the peer peer-address as-number as-number command to set the remote PE device
to the peer.
6.
7.
Run the ipv4-family vpnv4 [ unicast ] command to access the BGP-VPNv4 subaddress
family view.
8.
Run the peer peer-address enable command to enable VPN-IPv4 route exchange.
Issue 01 (2015-07-20)
125
Context
This function is configured on the AntiDDoS.
To configure traffic diversion and injection, modify the original route on the network first. In
the complex network environment, if the route is incorrectly configured, the loop occurs and
therefore normal services are adversely affected. To identify the route fault in a timely manner,
you are advised to run the following command to enable the loop check function in practice.
After the function is enabled, the system automatically checks whether received packets are
repetitive. If yes, the loop occurs. After loop counts reaches a value, the system automatically
cancels the traffic-diversion route to the destination IP address.
By default, the function is disabled.
Procedure
Step 1 Run the system-view command in the user view to access the system view.
Step 2 Run the anti-ddos loop-check [ match-time match-times ] command to configure the loop
check function.
Parameter match-time specifies match times for loop packets. When the match times exceeds
the match-time value, the system cancels the traffic-diversion route. The default match times
is 4, that is, the system cancels the traffic-diversion route when loop packets match for the
fifth times.
After the check is complete, run the undo anti-ddos loop-check command to disable the loop
check function.
----End
Context
You can configure blackhole traffic diversion for the blackhole router to divert the traffic
flood destined to specific IP addresses to a blackhole IP address. In this way, the flood traffic
will not occupy the inbound bandwidth of the cleaning device, and the services of other
customers are ensured. After you enable blackhole traffic diversion, the blackhole router
discards all traffic destined to the specified IP address. Exercise caution when you use this
function.
Blackhole traffic diversion can work in either of the following modes:
Issue 01 (2015-07-20)
126
Procedure
c.
d.
e.
Click OK.
c.
Select Enable Dynamic Blackhole Divert and enter a threshold and timeout time.
Threshold: When the traffic destined to the specified IP address reaches the
threshold, the device enables dynamic blackhole traffic diversion.
Timeout: When dynamic blackhole traffic diversion runs for the specified period of
time, the device automatically disables dynamic blackhole traffic diversion.
d.
Click OK.
----End
Issue 01 (2015-07-20)
127
Procedure
b.
b.
View anti-DDoS alarms and repair the anti-DDoS services according to repair
suggestions.
----End
Issue 01 (2015-07-20)
128
Context
The system automatically enables the defense mechanism against certain attacks such as those
on DNS rate limiting by source IP address or domain name even if Defense Mode of a Zone
is set to Manual.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Check the values in the State and Defense State columns.
If State of the Zone is Abnormal or Attacked, and Defense State is Not defended or Part
Defended, perform the following operations to handle abnormal events. Otherwise, no
operation is required.
Step 3 Click the state value of the State column.
Step 4 On the Abnormal Events tab page, search abnormal events on the detecting device and
cleaning device of the Zone.
Step 5 Select the event (of the cleaning device) whose Defense Status is Undefended and click
, enable the defense mechanism of the cleaning device against abnormal events.
Only the cleaning device can handle abnormal events.
----End
Packet Capture
In packet capture, the AntiDDoS captures packets according to the packet capture task
delivered by the management center. Then the device encapsulates captured packets in a fixed
format and sends them to the anti-DDoS collector for resolution.
In actual applications, packet capture is mainly used to analyze and locate network problems.
Different packet capture types are applicable to diversified application scenarios:
Issue 01 (2015-07-20)
129
When the AntiDDoS does not detect attacks, and packet loss occurs on the protected
network or access fails, you can adopt ACL-based packet capture to identify packet types
and thereby analyze defense failure.
After the packet-capture task is complete, the captured packets are saved in the packet-capture
file. With the packet-capture file, you can view attack events, trace attack sources, parse
attack packets, and extract fingerprints for locating attacks, and obtaining features and details
on attackers, so that proper defense policies can be configured. The packet-capture file can
also be downloaded to the local for other operations.
Packet parsing
You can obtain details on each packet by using packet parsing.
Fingerprint extracting
With fingerprint extracting, the system extracts the features of abnormal or attack
packets. Additionally, the system adds extracted fingerprints to the Zone fingerprint list
as the reference of traffic cleaning.
Analysis
The ATIC management center provides several types of analysis, traffic analysis,
anomaly/attack analysis, DNS analysis, HTTP analysis, SIP analysis, and Botnets/Trojan
horses/Worms Analysis. Thereby, the administrator can comprehensively learn about network
data in a timely manner and export the analysis result.
Figure 8-1 shows the analysis diagram.
Issue 01 (2015-07-20)
130
Report
The ATIC management center comes with both the system report and the Zone report, and
supports diversified reports. The system provides scheduled report generating and
downloading functions for comprehensive reports. This minimizes labor investment and
facilitates periodical network status monitoring and further query.
Figure 8-2 shows the comprehensive report.
Issue 01 (2015-07-20)
131
Prerequisites
You have configured the Encryption Key of Packet Capture.
1.
2.
Before configuring a packet capture task, configure a key for encrypting packet capture logs.
The AntiDDoS uses this key to encrypt packet capture logs and then sends the logs to the
ATIC management center. The ATIC management center uses this key to decrypt the logs and
process them. If the key is deleted, no packet is captured even though a packet capture task
has been configured.
Procedure
Step 1 Choose Defense > Policy Settings > Global Policy
Step 2 Click
Issue 01 (2015-07-20)
132
----End
Follow-up Procedure
Choose Defense > Policy Settings > Global Policy, select the check box of the device and
click
device to avoid data loss.
Select the check box of the packet capture task to be enabled and click
. The system delivers commands to the AntiDDoS to implement
the packet capture task.
NOTE
If the packet capture type is Zone Attack Matched or Zone Anomaly Matched, the
packet capture task can be enabled only after policies are successfully deployed on the
Zone of the task.
Disable
Select the check box of the packet capture task to be disabled and click
. The ATIC Management center delivers commands to the
AntiDDoS to cancel the packet capture task.
Delete
View
Issue 01 (2015-07-20)
1. Click the name of the packet capture task to be viewed for details on the
task.
133
Basic search
In the basic search area, select Device and State as search conditions, and
then click
Advanced search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions
such as Device, State, Zone, Type or Task Name, and then click
Search.
Prerequisites
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 On the Packet Capture Task page, click
Step 3 On the Create Packet Capture Task page, select ACL Matched from the Type drop-down
list.
Issue 01 (2015-07-20)
134
Step 4 Set other basic parameters. For details, see Table 8-1.
Table 7-1 Creating a packet capture task
Parame
ter
Description
Reference Value
Task
Name
Samplin
g Ratio
Capture
d Packet
Issue 01 (2015-07-20)
135
Parame
ter
Description
Reference Value
Disable
Enable
2.
Description
Protocol
Source IP
Source IP
address mask
Issue 01 (2015-07-20)
136
Parameter
Description
are compared in binary mode. The number of 1 in the mask indicates the
bit to be reserved and compared in an IP address and the number of 0
indicates the bit to be ignored. For example, if the source IP address needs
to be matched, the matching value is 192.168.1.100, and the mask is
255.255.255.0, packets whose source IP addresses start with 192.168.1
meet matching rules.
Source Port
This item is required when TCP or UDP is selected for Protocol Type.
Destination
IP
Destination
IP address
mask
Destination
Port
This item is required when TCP or UDP is selected for Protocol Type.
3.
Click OK.
The Create Packet Capture Task page is displayed.
Only one ACL-based packet capture task can be enabled on an AntiDDoS within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing Packet
Capture Task.
Prerequisites
Issue 01 (2015-07-20)
137
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Context
The detecting device detects traffic, but does not process the traffic. Only the cleaning device
can discard packets. Therefore, when you create a global discarding packet capture task,
Device can be only the cleaning device.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 On the Packet Capture Task page, click
Step 3 On the Create Packet Capture Task page, select Global Defense Matched from the Type
drop-down list.
Step 4 Set other basic parameters. For details, see Table 8-3.
Table 7-3 Creating a packet capture task
Parame
ter
Description
Reference Value
Task
Name
Samplin
g Ratio
Capture
d Packet
Issue 01 (2015-07-20)
138
Parame
ter
Description
Reference Value
Disable
Enable
Only one global packet capture task can be enabled on an AntiDDoS within a period of time.
----End
Issue 01 (2015-07-20)
139
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing Packet
Capture Task.
Prerequisites
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Context
Only the cleaning device discards packets when a Zone is under attack. Therefore, when you
create a Zone attacked packet capture task, Device can be only the cleaning device.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 On the Packet Capture Task page, click
Step 3 On the Create Packet Capture Task page, select Zone Attack Matched from the Type
drop-down list.
Step 4 Set other basic parameters. For details, see Table 8-4.
Table 7-4 Creating a packet capture task
Parame
ter
Description
Reference Value
Task
Name
Issue 01 (2015-07-20)
140
Parame
ter
Description
Reference Value
greater than (>),
ampersands (&),
semicolons (;), inch marks
("), and percents (%)
cannot be included.
Samplin
g Ratio
Capture
d Packet
Disable
Enable
Issue 01 (2015-07-20)
. Select a Zone from the Zone list and click OK to add the Zone.
141
Only one attack event-based packet capture task can be enabled for each Zone within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing Packet
Capture Task.
Prerequisites
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 On the Packet Capture Task page, click
Step 3 On the Create Packet Capture Task page, select Zone Anomaly Matched from the Type
drop-down list.
Issue 01 (2015-07-20)
142
Step 4 Set other basic parameters. For details, see Table 8-5.
Table 7-5 Creating a packet capture task
Parame
ter
Description
Reference Value
Task
Name
Samplin
g Ratio
Capture
d Packet
Issue 01 (2015-07-20)
143
Parame
ter
Description
Reference Value
Disable
Enable
After automatic fingerprint extraction is enabled and packets are captured, the ATIC
management center automatically extracts fingerprints, creates a fingerprint filter, and delivers
the fingerprints to all cleaning devices bound to the Zone. The conditions for extracting
fingerprints are as follows:
Parameter
Description
Reference Value
Minimum Length Of
Fingerprint
Excluded Keyword
When the packet number of pcap files has reached the number specification, fingerprint will
be extracted. Each time only one fingerprint, which has the highest hit rate, can be extracted.
Fingerprint will be deployed as fingerprint filter to associated device. Fingerprint filter can be
manually deleted.
If the filter number has reached the upper limit, no more fingerprint filter will be created.
Step 5 Click Next.
Step 6 Click
. Select a Zone from the Zone list and click OK to add the Zone.
144
Step 8 Click
Only one anomaly-based packet capture task can be enabled for each Zone within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing Packet
Capture Task.
Click
of a packet capture file in the Operation column to view attack or
anomaly events. For details, see 8.3.4.1 Viewing Anomaly or Attack Events.
Trace
Source
Click
of a packet capture file in the Operation column to trace attack
sources. For details, see 8.3.4.2 Tracing Attack Sources Through a Packet
Capture File.
Parse
Packet
Extract
Fingerprin
t
Click
of a packet capture file in the Operation column to parse captured
packets. For details, see 8.3.4.3 Parsing Packets in a Packet Capture File.
Click
of a packet capture file in the Operation column to extract
fingerprints. For details, see 8.3.4.4 Extracting Fingerprints from a Packet
Capture File.
Download
Click
of a packet capture file in the Operation column to download the
file. For details, see 8.3.4.5 Downloading a Packet Capture File.
View
Packet
Capture
Task
Click Task Name of a packet capture file to view information about the
packet capture task that generates the file.
Delete
Issue 01 (2015-07-20)
145
capture file.
Search
Basic search
In the basic search area, select Task Name and File Name as search
conditions, and then click
Advanced search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions
such as Start Time, End Time, Packet Capture Type, File State,
Task Name, and File Name, and then click Search.
Prerequisites
The packet capture task of Zone Attack Matched or Zone Anomaly Matched has been
created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click
Step 4 On the View Correlated Events page, view related anomaly or attack events. For parameter
settings, see Table 8-6.
Table 7-6 Viewing attack events
Parameter
Description
IP Address
Zone Name
Start Time of an
Anomaly
Attack Start
Issue 01 (2015-07-20)
146
Parameter
Description
Time
End Time
State
Type
Number of
Attack Packets
Prerequisites
The packet capture task of Global Defense Matched, Zone Attack Matched or Zone
Anomaly Matched has been created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click
Issue 01 (2015-07-20)
147
Step 4 On the Trace Source page, view the result of attack source tracing. For parameter settings,
see Table 8-7.
Table 7-7 Attack source tracing parameters
Parameter
Description
Number of
Packets
Number of
Source IP
Addresses
Source IP
Address
Protocol Type
Destination Port
Attack Times
Step 5 Optional: Select one or more check boxes of attack records and click Add Items to Blacklist.
Suspicious IP addresses are displayed in the blacklist of this Zone. The blacklist entries take
effect after deployment on NEs. For details on the deployment process, see 6.2.12 Deploying
the Defense Policy.
Blacklist is enabled for Zones. Attack sources are traced for packets captured after Zone Attack
Matched and Zone Anomaly Matched are enabled. Then the attack sources can be blacklisted.
Issue 01 (2015-07-20)
148
Prerequisites
A packet capture task has been created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click
Step 4 On the Packet Parsing page, you can view details on each packet, including the sending time,
source IP address, destination IP address, protocol type of the packet.
Step 5 Click each packet parsing record, the details are displayed in the group boxes in the middle or
below.
Issue 01 (2015-07-20)
149
Prerequisites
The packet capture task of Zone Attack Matched or Zone Anomaly Matched has been
created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click
The fingerprint of the packet capture file is extracted and displayed in Fingerprint List on the
left area.
2.
On the Packet Capture File page that is displayed, select a packet capture file of the
same device as the reference file and click OK.
The fingerprint of the reference file is extracted and displayed in Fingerprint List on the
right area.
Step 5 Optional: In the fingerprint list on the left, select the fingerprint to be added, and then click
Add the Fingerprint on the lower part of the page. The fingerprint is displayed in the
protocol fingerprint list of a Zone. For details on the protocol types of fingerprints, see 6.2.6
Configuring the Zone-based Defense Policy. Fingerprints take effect only after deployed on
the device. For details on the deployment process, see 6.2.12 Deploying the Defense Policy.
Step 6 Click Close. Return to the Packet Capture File page.
----End
Issue 01 (2015-07-20)
150
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture Task tab.
Step 3 Click
Step 4 On the download page that is displayed, open or save the file.
----End
Issue 01 (2015-07-20)
151
8 Report
Report
8.1 Overview
Reports are used to analyze network traffic and attack logs and summarize system and Zone
traffic information and attack logs periodically.
The ATIC management center provides four types of analysis: traffic analysis,
abnormality/attack analysis, DNS analysis, and HTTP(S) Analysis. This analysis helps the
administrator comprehensively learn about network data in real time. The ATIC management
center also provides system and Zone reports in diversified forms. The reports can be
generated periodically. This function is labor-saving and facilitates network status monitoring
and query.
Issue 01 (2015-07-20)
152
8 Report
Traffic Comparison
Collects statistics on the inbound traffic, outbound traffic, and attack traffic and
compares the three types of traffic. For details, see 9.2.2 Traffic Comparison.
IP Traffic Top 10
Collects statistics on the traffic to each IP address and displays data of the top N IP
addresses. For details, see 9.2.3 Traffic Top N.
Parameter
Table 8-1 Query parameters of data overview
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Time
Total (Detecting):
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
153
Parameter
8 Report
Description
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
Data overview is displayed in Figure 9-1.
Figure 8-1 Data overview
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Data Overview tab.
Step 3 Set query parameters.
Step 4 Click Search.
Reports that meet the query conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
154
8 Report
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-2 Query parameters of traffic comparison
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. Traffic destined for the IP address is queried.
Protocol
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
155
Parameter
8 Report
Description
than seven days, statistics are collected hourly.
Statistics
Unit
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning), traffic comparison within a period of time is displayed
in Figure 9-2.
Figure 8-2 Traffic comparison
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Traffic Comparison tab.
Step 3 Set query parameters.
Step 4 Click Search.
The traffic comparison result that meets query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
156
8 Report
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
IP Traffic Top N
Ranks traffic by destination IP address. If traffic anomalies occur, you can view IP
Traffic Top N to learn about the IP addresses with the largest volumes of inbound or
attack traffic.
Parameter
Table 9-3 shows parameters when Report Type is set to Zone Traffic Top N. Table 9-4
shows parameters when Report Type is set to Service Traffic Top N. Table 9-5 shows
parameters when Report Type is set to IP Traffic Top N.
Table 8-3 Query parameters of Zone Traffic Top N
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Total (Detecting):
Issue 01 (2015-07-20)
157
Parameter
8 Report
Description
Protocol
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Type
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is shorter than seven days, statistics are collected
hourly.
Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Incoming Traffic or Attack Traffic can be selected for anti-DDoS
cleaning devices, and only Incoming Traffic can be selected for
anti-DDoS detecting devices.
Statistics
Unit
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Top N
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Issue 01 (2015-07-20)
Total (Detecting):
158
8 Report
Parameter
Description
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Type
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is shorter than seven days, statistics are collected
hourly.
Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Incoming Traffic or Attack Traffic can be selected for anti-DDoS
cleaning devices, and only Incoming Traffic can be selected for
anti-DDoS detecting devices.
Statistics
Unit
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Top N
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Zone
Issue 01 (2015-07-20)
Total (Detecting):
Click
159
Parameter
8 Report
Description
click OK.
Service
Protocol
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is shorter than seven days, statistics are collected
hourly.
Type
Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Statistics
Unit
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Top N
Example
If the device is set to Total (Cleaning), traffic type to Attack Traffic, statistical method to
Average Value, and protocol type to Total, top N Zones by traffic within a period of time are
displayed in Figure 9-3.
Issue 01 (2015-07-20)
160
8 Report
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Traffic Top N tab.
Step 3 Set query parameters.
Step 4 Click Search.
The status of the top N Zone traffic of corresponding query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
161
8 Report
Traffic Comparison
Compares the Incoming Traffic, Outgoing Traffic, and Attack Traffic of specified
Zones in different time range granularities in the report. You can compare the traffic
information of different applications based on service types.
You can use Traffic Comparison to view the Zones or destination IP addresses under
attacks, comparison of inbound and outbound traffic, as well as the volume of attack
traffic.
Traffic Distribution
Displays the service distribution of IncomingTraffic and Attack Traffic of the specified
Zones in different time range granularities in the report.
You can use Traffic Distribution to view the protocol distribution of specific Zones or
destination IP addresses to determine whether to enable attack defense for a certain type
of traffic.
Parameter
To query comparison between incoming and outgoing application traffic, set Report Type to
Traffic Comparison. (For parameters, see Table 9-6.) To query traffic distribution of all types
of applications, set Report Type to Traffic Distribution. (For parameters, see Table 9-7.)
Table 8-6 Parameters for querying traffic comparison
Parameter
Description
Device
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. Traffic destined for the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
162
Parameter
8 Report
Description
than seven days, statistics are collected hourly.
Statistics
Unit
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic measurement unit. The unit can be pps qps, or kbit/s.
The default unit is pps. qps takes effect only for HTTP traffic.
Description
Device
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
IP Address
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time must be later than the start time and the interval cannot be
longer than one year.
Type
Statistics
Unit
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
163
8 Report
Example
Figure 8-4 Comparison between incoming and outgoing application traffic
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Application Traffic tab.
Step 3 Set query parameters.
Step 4 Click Search.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
164
8 Report
Parameter
Table 8-8 Query parameters of protocol traffic distribution
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. Traffic destined for the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Unit
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning) and the Zone to Total, traffic distribution within a
period of time is displayed in Figure 9-5.
Issue 01 (2015-07-20)
165
8 Report
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Protocol Traffic Distribution tab.
Step 3 Set query parameters. For details, see Table 9-8.
Step 4 Click Search.
Traffic distribution that meets query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
166
8 Report
Function
Number of TCP connections provides visibility into the number of new TCP connections and
number of concurrent TCP connections by destination IP address, and number of new
connections by source IP address with the most connections. In normal cases, observe and
record the number of new connections and that of concurrent connections of services in the
report. If the number of new connections or the number of concurrent connections is greater
than the normal value, capture packets for analyzing anomalies or attacks.
Parameter
When Type is set to Destination IP Address, you can view the number of new connections
and concurrent connections by destination IP address. For parameters, see Table 9-9. When
Type is set to Source IP Address, you can view the number of new TCP connections by
source IP address with the most connections within the given time segment. For parameters,
see Table 9-10.
Table 8-9 Parameters for querying the connection number by destination IP address
Parameter
Description
Device
Select a cleaning device from the drop-down list. The Total (Cleaning)
indicates the number of connections on all cleaning devices.
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
Type
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The number of connections to the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Statistics
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
167
8 Report
Table 8-10 Parameters for querying the connection number by source IP address
Parameter
Description
NE
Select a cleaning device from the drop-down list. The Total (Cleaning)
indicates the number of connections on all cleaning devices.
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Type
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to Total (Cleaning), Zone to Total, service to TCP, and statistical method
to Average Value, the number of connections within a period of time is displayed in Figure
9-6.
Figure 8-6 Number of new connections and concurrent connections by destination IP address
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Issue 01 (2015-07-20)
168
8 Report
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-11 Query parameters of Board Traffic
Parameter
Description
Device
Protocol
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
169
8 Report
Parameter
Description
Unit
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to bj (Cleaning) and the protocol to UDP, board traffic within a period of
time is displayed in Figure 9-7.
Figure 8-7 Board traffic
Procedure
Step 1 Choose Report > Report > Traffic Analysis.
Step 2 Click the Board Traffic tab.
Step 3 Set query parameters. For details, see Table 9-11.
Step 4 Click Search.
The board traffic result that meets query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
170
8 Report
Parameter
Table 8-12 Query parameters of IP Location Top N
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Type
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Incoming Traffic or Attack Traffic can be selected for anti-DDoS
cleaning devices, and only Incoming Traffic can be selected for
anti-DDoS detecting devices.
Unit
Issue 01 (2015-07-20)
Select a traffic measurement unit. The unit can be pps or kbit/s. The
171
Parameter
8 Report
Description
default unit is pps.
Top N
Example
If the device is set to Total (Cleaning), zone to Total, traffic type to Incoming Traffic, top N
IP locations that have the maximum incoming traffic in a specific period will be displayed, as
shown in Figure 9-8.
Figure 8-8 IP Location Top N
Procedure
Step 1 Choose Report > Report > Traffic Analysis
Step 2 Click the IP Location Top N tab.
Step 3 Set query parameters.
Step 4 Click Search.
The status of the top N IP locations that match the query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
172
8 Report
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-13 Query parameters of IP location traffic
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Location
Click
OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
173
Parameter
Type
8 Report
Description
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Incoming Traffic or Attack Traffic can be selected for anti-DDoS
cleaning devices, and only Incoming Traffic can be selected for
anti-DDoS detecting devices.
Unit
Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning), zone to Total, traffic type to Incoming Traffic, the
incoming traffic of a specific IP location in a specific period is displayed, as shown in Figure
9-9.
Figure 8-9 Incoming traffic of a specific IP traffic
Procedure
Step 1 Choose Report > Report > Traffic Analysis
Step 2 Click the IP Location Traffic tab.
Step 3 Set query parameters.
Step 4 Click Search.
Issue 01 (2015-07-20)
174
8 Report
Information about IP location traffic that matches the query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-14 Query parameters of Anomaly/Attack details
Parameter
Description
Device
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The anomaly/attack datails of traffic destined for the IP
address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
Issue 01 (2015-07-20)
175
Parameter
8 Report
Description
The end time should be later than the start time and the interval cannot
be longer than one year.
Type
Example
Anomaly/attack details that meet the query conditions are displayed, as shown in Figure 9-10.
Figure 8-10 Anomaly/attack Details
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Anomaly/Attack Details tab.
Step 3 Set query parameters.
Step 4 Click Search.
Issue 01 (2015-07-20)
176
8 Report
Click
You can trace attack sources, resolve packets based on the packet capture files, and
download the files to obtain the details on and features of the attacker. In this way, you
can work out proper defense policies. For details, see 8.3.4.2 Tracing Attack Sources
Through a Packet Capture File, 8.3.4.3 Parsing Packets in a Packet Capture File, and
8.3.4.5 Downloading a Packet Capture File.
You cannot view the packet capture files associated with certain anomaly or attack
events.
Click
Step 6 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-15 Query parameters of Zone Anomaly/Attack Top N
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that attack traffic on all cleaning devices is queried.
Issue 01 (2015-07-20)
Total (Detecting):
177
Parameter
8 Report
Description
each defense group and among defense groups is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Top N
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that attack traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Top N
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that attack traffic on all cleaning devices is queried.
Total (Detecting):
Issue 01 (2015-07-20)
178
Parameter
8 Report
Description
defense group is queried and the sum of anomaly traffic volumes
among defense groups is queried.
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Top N
Example
If the Device is Total (Cleaning), Figure 9-12 shows top N Zones by anomalies or attacks
within a period of time.
Figure 8-12 Top N Zones by anomaly/attack
In the left figure, top N Zones by the times of attacks are displayed.
In the right figure, top N Zones by the duration of attacks are displayed.
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Anomaly/Attack Top N tab.
Issue 01 (2015-07-20)
179
8 Report
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-18 Query parameters of Attacks Top N
Parameter
Description
Device
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Top N
Issue 01 (2015-07-20)
180
8 Report
Example
If the Device is set to Total (Cleaning), top N attack events within a period of time are
displayed in Figure 9-13.
Figure 8-13 Attacks Top N
The upper chart displays top N attack events by attack packet quantity.
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Attack Top N tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N attacks that meet the query conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
181
8 Report
Parameter
Table 8-19 Query parameters of Anomaly/Attack Type Distribution
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that attack traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The anomaly/attack traffic destined for the IP address is
queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Example
If the Device is set to Total (Cleaning) and the Zone to test, the distribution of
anomaly/attack types within a period of time is displayed in Figure 9-14.
Issue 01 (2015-07-20)
182
8 Report
In the left figure, the distribution chart of attack types is displayed by times.
In the right figure, the distribution chart of attack types is displayed by packet quantity.
If the device is set to Total (Detecting) and the Zone to test, Figure 9-15 shows
anomaly/attack type distribution within a period of time.
Figure 8-15 Anomaly/attack type distribution (for detecting devices)
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Distribution of Anomaly/Attack Types tab.
Step 3 Set query parameters.
Step 4 Click Search.
The distribution of anomalies/attacks that meet the query conditions is displayed.
Issue 01 (2015-07-20)
183
8 Report
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Parameter
Table 8-20 Query parameters of Packet Discarding Trend
Parameter
Description
Device
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The anomaly/attack log of traffic destined for the IP address
of the Zone is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Issue 01 (2015-07-20)
184
8 Report
Example
If the Device is set to Total (Cleaning), the packet discarding trend within a period of time
are displayed in Figure 9-16.
Figure 8-16 Packet Discarding Trend
This chart is an overlay discarding packets chart. Through the chart, you can view the total numbers of
discarding packets at a point in time and traffic change trends of various discarding packets.
User_defined_filter packets: packets discarded because of static filtering policies such as signatures,
ACLs, blacklist entries, and host filtering policies
Client_attacks packets: packets discarded because of attacks that use the attacker's IP address to
establish TCP connections
Malformed_connections packets: packets discarded because of the FIN flood, DNS cache poisoning,
or DNS reflection attacks
Overflow packets: packets discarded because of the configured traffic limiting or rate limiting
policies
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Packet Discarding Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
The trend chart of packet discarding meeting query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
185
8 Report
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
Then click OK.
----End
Function
The top N DNS request trend displays top N requested domain names or top N source IP
addresses by DNS request traffic rate in incoming traffic, outgoing traffic, or detecting traffic.
For top N requests, you can perform the following operations:
Add top N domain names to the DNS cache to improve the response rate and reduce
burdens on the DNS server.
Parameter
Table 8-21 Parameters for querying Top N Request Trend
Parame
ter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total Detecting
are described as follows:
Total (Cleaning):
Indicates that DNS traffic on all cleaning devices is queried.
Issue 01 (2015-07-20)
Total (Detecting):
186
Parame
ter
8 Report
Description
group and among defense groups is queried.
Zone
Click
Time
Click
to select the start time and end time of statistics. Or you can change
the time values in corresponding text boxes.
, select a Zone on the Zone page that is displayed, and then click OK.
The end time must be later than the start time and the interval cannot be longer
than one year.
Type
If the query interval is longer than or equal to seven days and shorter than
one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than seven
days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected every five
minutes.
Domain Name Request: indicates the trend of top N domain names that are
mostly requested.
Statistic
s
Top N
Example
If the Device is set to Total (Cleaning), traffic type to Domain Name Request, and statistical
method to Current Top N, top N trend analysis results with a period of time are displayed in
Figure 9-17.
Issue 01 (2015-07-20)
187
8 Report
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Top N Request Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N trend analysis results are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
188
8 Report
Function
The top N response trend diagram provides visibility into top N source IP addresses in DNS
response traffic.
You can limit the rate of DNS response packets by top N DNS source IP addresses. For details,
see 6.2.6.5 DNS Defense Policy.
Parameter
Table 8-22 Parameters for querying the top N response trend
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that DNS traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time must be later than the start time and the interval cannot be
longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Statistics
Top N
Example
If the Device is set to Total (Cleaning), traffic type to Average Top N, the top N response
trend within a given time segment is displayed, as shown in Figure 9-18.
Issue 01 (2015-07-20)
189
8 Report
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Top N Response Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N trend analysis results that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
190
8 Report
Function
The DNS cache request trend collects statistics on external requests for domain names in the
DNS cache. If domain names in the DNS cache are seldom requested, replace them with
domain names that are frequently requested.
Parameter
Table 8-23 Query parameters of Cache Request Trend
Parameter
Description
Device
Select a cleaning device from the drop-down list. The Total (Cleaning)
indicates that traffic on all cleaning devices is queried.
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to Total (Cleaning) and the Zone to Total, Figure 9-19 shows the analysis
results of the cache request trend within a period of time.
Issue 01 (2015-07-20)
191
8 Report
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Cache Request Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
The analysis results of the cache request trend are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
192
8 Report
Function
The request category trend collects statistics on DNS request packets and displays various
DNS request curves. This function allows you to monitor DNS traffic distribution on the live
network.
Parameter
Table 8-24 Query parameters of Request Category Trend
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that DNS traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The DNS traffic destined for the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Type
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Total Traffic: Indicates the sum of TCP traffic and UDP traffic.
TCP
UDP
193
8 Report
Example
If the Device is set to Total (Cleaning) and the Zone to Total, the trend analysis results of
DNS within a period of time are displayed in Figure 9-20.
Figure 8-20 Trend analysis
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Request Category Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
Trend analysis results of DNS are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
194
8 Report
Function
The successful resolution ratio is the ratio of the rate of responses from the DNS server to the
rate of requests for DNS services. When the DNS server is not attacked, observe and record
the normal value of the successful resolution ratio. If you find that the successful resolution
ratio is strikingly lower than the normal value, capture packets and check whether the DNS
server is being attacked.
Parameter
Table 8-25 Query parameters of Resolution Success Ratio
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that DNS traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. DNS traffic destined for the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
195
Parameter
8 Report
Description
If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to Total (Cleaning) and the Zone to Total, the success resolution ratio
within a period of time is displayed in Figure 9-21.
Figure 8-21 Success resolution ratio
The request rate indicates the rate of requests for DNS services from the extranet.
The response rate indicates the rate of responses by the DNS server to the external requests for DNS
services.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Resolution Success Ratio tab.
Step 3 Set query parameters.
Step 4 Click Search.
The success resolution ratio that meets query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Issue 01 (2015-07-20)
196
8 Report
Click
Then click OK.
----End
Parameter
Table 8-26 Query parameters of Abnormal Packet Analysis
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that DNS traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Service
IP Address
Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The DNS traffic destined for the IP address is queried.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter than
seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
197
Parameter
8 Report
Description
every five minutes.
Example
If the Device is set to Total (Cleaning) and the Zone to Total, the analysis of the normal and
anomaly packets within a period of time is displayed in Figure 9-22.
Figure 8-22 Anomaly packet analysis
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Abnormal Packet Analysis tab.
Step 3 Set query parameters.
Step 4 Click Search.
The analysis of the normal and anomaly packets that meet the query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Issue 01 (2015-07-20)
198
8 Report
Function
Top N HTTP request sources by traffic display top N source IP addresses in HTTP incoming,
outgoing, or detecting traffic.
Parameter
Table 8-27 Parameters for querying top N HTTP request sources by traffic
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that HTTP traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Statistics
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
199
8 Report
Parameter
Description
Unit
Top N
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP
request sources by incoming and outgoing traffic within a given time segment is displayed, as
shown in Figure 9-23.
Figure 8-23 Top N HTTP request sources by incoming traffic
Issue 01 (2015-07-20)
200
8 Report
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 2 Click the Top N HTTP Request Sources by Traffic tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N HTTP request sources that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
Issue 01 (2015-07-20)
201
8 Report
----End
Function
Top N HTTPS request sources by traffic display top N source IP addresses in HTTPS
incoming, outgoing, or detecting traffic.
Parameter
Table 8-28 Parameters for querying top N HTTPS request sources by traffic
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that HTTP traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Statistics
Top N
Issue 01 (2015-07-20)
202
8 Report
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTPS
request sources by incoming traffic within a given time segment is displayed, as shown in
Figure 9-25, top N HTTPS request sources by outgoing traffic within a given time segment is
displayed, as shown in Figure 9-26.
Figure 8-25 Top N HTTPS request sources by incoming traffic
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 2 Click the Top N HTTPS Request Sources by Traffic tab.
Step 3 Set query parameters.
Step 4 Click Search.
Issue 01 (2015-07-20)
203
8 Report
Top N HTTPS request sources that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Function
Top N HTTP URIs display top N URI fields in the HTTP traffic destined for the Zone.
Parameter
Table 8-29 Parameters for querying top N HTTP URIs
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that HTTP traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
Issue 01 (2015-07-20)
204
Parameter
8 Report
Description
The end time should be later than the start time and the interval cannot
be longer than one year.
If the query interval is longer than or equal to seven days and shorter
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Statistics
Top N
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP URIs
within a given time segment is displayed, as shown in Figure 9-27.
Figure 8-27 Top N Requested URl
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 2 Click the Top N Requested URl tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N HTTP URIs that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
205
8 Report
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Function
Top N HTTP host fields display those in the HTTP traffic destined for the Zone.
Parameter
Table 8-30 Parameters for querying top N HTTP host fields
Parameter
Description
Device
Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
Total (Cleaning):
Indicates that HTTP traffic on all cleaning devices is queried.
Total (Detecting):
Zone
Click
, select a Zone on the Zone page that is displayed, and then
click OK.
Time
Click
to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time must be later than the start time and the interval cannot be
longer than one year.
Issue 01 (2015-07-20)
If the query interval is longer than or equal to seven days and shorter
206
Parameter
8 Report
Description
than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are collected
every five minutes.
Statistics
Top N
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP host
fields within a given time segment is displayed, as shown in Figure 9-28.
Figure 8-28 Top N Requested Host
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 2 Click the Top N Requested Host tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N HTTP host fields that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to the specified
email address.
Issue 01 (2015-07-20)
Click
to open or save the query results as PDF files. A maximum
of 10,000 entries can be displayed.
207
8 Report
Click
to open or save the query results as EXCEL files. A
maximum of 10,000 entries can be displayed.
Click
to open or save the query results as CSV files. All data
except figures can be displayed.
Click
Then click OK.
----End
Procedure
b.
c.
Description
Value
Devic
e
Total (Cleaning):
Indicates that traffic on all cleaning
devices is queried.
Comp
Issue 01 (2015-07-20)
Total (Detecting):
208
Para
meter
Description
arison
Cycle
type
Time
Click
to select the start time and
end time of statistics. Or you can
change the time values in
corresponding text boxes.
8 Report
Value
figure: queries the data within the
given time segment.
Report
Type
d.
Click OK. On the file download page that is displayed, open or save the system
report.
If you need to reset the parameter, click Reset.
b.
c.
Description
Value
Zone
Click
, select a Zone on the Zone
page that is displayed, and then click
Issue 01 (2015-07-20)
209
Para
meter
8 Report
Description
Value
OK.
Devic
e
Total (Cleaning):
Indicates that traffic on all cleaning
devices is queried.
Comp
arison
Total (Detecting):
Cycle
type
Time
Click
to select the start time and
end time of statistics. Or you can
change the time values in
corresponding text boxes.
Issue 01 (2015-07-20)
210
8 Report
Para
meter
Description
Value
Report
Forma
t
Report
Type
d.
Click OK. On the file download page that is displayed, open or save the Zone
report.
If you need to reset the parameter, click Reset.
----End
Click
of a scheduled task to modify it. For the parameters, see 9.6.2.1
Creating a Scheduled Task.
State
Suspended: Indicates that the system does not perform the scheduled
task when the scheduled time approaches.
Click
or
to change the status of the tasks that are
Suspended to Enabled.
Enable
Disable
Result
Issue 01 (2015-07-20)
Expired: When the scheduled time of the task exceeds Life Cycle, this
task expires and the system does not perform the task any longer.
Click
Enable.
Click
Suspended.
1. Click
of a task.
2. On the Result page, you can view the execution time and report status
of a task.
211
Search
8 Report
Click
Click
Delete
Delete tasks in batches: Select the check boxes of multiple tasks and
click
tasks.
Prerequisites
When you need to use the mailbox to receive the reports, you must complete the configuration
of the mail server in the ATIC Management center. For details, see 10.4.1 Mail Server.
Procedure
Step 1 Choose Report > Comprehensive Report > Scheduled Task.
Step 2 On the Scheduled Task List page, click
Issue 01 (2015-07-20)
212
8 Report
Step 3 Configure scheduled task information. For details, see Table 9-33.
Table 8-33 Creating a scheduled task
Parameter
Description
Setting
Name
Plan
Run Time
Life Cycle
Report Format
Issue 01 (2015-07-20)
213
8 Report
Parameter
Description
Setting
Description
Follow-up Procedure
You can view or download reports generated by the scheduled task by performing 9.6.3
Downloading Report.
Click
of a report in the Operation column to view, and download
the report.
Search
Enter the name of the report to be searched for in the Report Name
Issue 01 (2015-07-20)
214
8 Report
Procedure
Step 1 Choose Report > Report Customization > Report Customization.
Step 2 Specify the carrier name and select the logo image file in Report Customization. Then click
OK.
After the configuration, the customized carrier name and logo are printed in all reports.
----End
Operation
Choose Report > Report Customization > IP Address Description to manage IP
description.
Creat
e
Modi
fy
Delet
e
Click
Description.
Click
Issue 01 (2015-07-20)
Delete an IP description:
Click
215
8 Report
1. Click
above
Expo
rt
Expo
rt All
Searc
h
Creating an IP Description
Step 1 Choose Report > Report Customization > IP Address Description.
Step 2 On the IP Address Description page, click
Issue 01 (2015-07-20)
216
8 Report
Issue 01 (2015-07-20)
217
9 System Management
System Management
The password policy defines the minimum length and complexity of the passwords of
the system administrators.
The session timeout duration refers to the period in which the session between the
system administrator and the ATIC Management center has been interrupted because of
timeout. Any operations of the system administrator on the ATIC Management center
will clear the session timeout duration and restart the time counting.
Issue 01 (2015-07-20)
218
9 System Management
If the system administrator performs no operation within the timeout duration after
logging in to the ATIC Management center, the current session will be interrupted
because of timeout. When the system administrator wants to perform operations on the
ATIC Management center again, the system administrator needs to re-log in to the ATIC
Management center.
The login policy defines whether the system will be locked after the password has been
entered incorrectly for a certain consecutive times within 10 minutes and when the
system will be unlocked automatically if the system is locked.
The permission/domain management of the ATIC Management center and the restriction to
the IP addresses that access the ATIC Management center are implemented by configuring the
administrator groups and administrators as follows:
The administrator groups are collections of the operation permissions. You can assign an
administrator group to administrator so that the administrator can have the permission on
this administrator group. The ATIC Management center provides three default
administrator groups, namely the administrator, operator, and auditor groups.
The system provides the default administrator admin. The default administrator has all
operation permission and can manage all resources. In addition, the default administrator
cannot be modified. You can create a new administrator and select an administrator
group and resources for this administrator to implement the permission/domain-specific
management of the ATIC Management center.
You can select the IP address segments that can access the ATIC Management center for
an administrator to implement the restriction of IP addresses that access the ATIC
Management center.
Click
corresponding to the administrator to modify its authentication
mode, password, description, associated administrator group, managed
resources, and allowed IP address segment. For details about this operation, see
10.1.2.2 Modifying an Administrator Group.
Lock
Unlock
Issue 01 (2015-07-20)
to unlock the
219
9 System Management
administrator.
NOTE
The current administrator has the permission to unlock an administrator.
Delete
NOTE
The current administrator has the permission to delete an administrator.
View
Status
The default administrator admin or another administrator who has the lock
permission can manually lock an illegal user. The user that is manually
locked can only be unlocked manually by The default administrator admin
or another administrator who has the unlock permission.
Context
Only the default administrator admin can perform one-click alarm clearing, configuration
restoration, all deployment and public configurations.
Procedure
Step 1 Choose System > System Administrators > Administrators.
Step 2 Click
Issue 01 (2015-07-20)
220
9 System Management
Step 3 Set the parameters of the new administrator, as described in Table 10-1.
Table 9-1 Parameters of the new administrator
Parameter
Description
Value
Username
Authentication
Mode
Issue 01 (2015-07-20)
221
Parameter
9 System Management
Description
Value
server as the client and it performs
the remote authentication through the
RADIUS protocol.
Advantages of the RADIUS
authentication: High security and
reliability when the third-party server
is used for authentication because it
supports the resending mechanism
and standby server mechanism.
Disadvantages of the RADIUS
authentication: High operation
expenditure as it requires the
deployment of the RADIUS server.
NOTE
When RADIUS authentication is adopted,
you need to configure the RADIUS server.
For details, see 10.1.6 Configuring the
Authentication Server.
Password
Confirm
password
Description
Step 4 Configure the permissions, resources, and allowed IP address segment for the administrator.
By default, the administrator has no associated administrator group and no resources, and can access the
ATIC Management center from any IP addresses. You must specify an administrator group to the
administrator, and select the resources and IP address segment as required.
Click the Select Administrator Group tab, and select an administrator group for the
administrator.
When multiple administrator groups are selected, the permission of the administrator is
the permission collection of all the selected administrator groups.
Issue 01 (2015-07-20)
Click the Select Resource tab, and select manageable resources according to Resource
Type.
222
9 System Management
Click the Select Login Network Segment tab. Perform the following operations to
configure the IP address segment list and then select one allowed IP address segment for
the administrator.
Click
OK.
to delete it.
Follow-up Procedure
When RADIUS authentication is adopted for the administrator, you need to configure the
RADIUS server. For details, see 10.1.6 Configuring the Authentication Server.
Context
The three default administrator groups administrator, operator, and auditor are not allowed
to modify.
Procedure
Step 1 Choose System > System Administrators > Administrators.
Step 2 Click
Step 3 On the Modify Administrator page, change the basic information about the administrator.
Table 10-1 lists the parameters.
Step 4 Change the administrator's permission, manageable resources, and IP address segments
allowed to log in to the ATIC management center.
Click the Select Administrator Group tab and select the required administrator group in
the administrator group list.
When you select multiple administrator groups, the permission of the administrator is the
union of all selected administrator groups.
Click the Select Resource tab and select the manageable resources.
Click the Select Login Network Segment tab and select the IP address segment from
which the administrator is allowed to log in to the ATIC management center.
Issue 01 (2015-07-20)
223
9 System Management
After an administrator's permission is modified, the permission takes effect only after the
administrator re-logs in. However, the manageable resources take effect immediately after
being modified without requiring administrator re-login.
Step 5 Click OK.
----End
Click
corresponding to the administrator group to modify its description
and permission set. For details about this operation, see 10.1.3.2 Modifying
an Administrator Group.
When the administrator group has associated administrators, the permissions
of these administrators will also be modified after the administrator group
permission is modified. The modification of administrator permissions takes
effect upon the next login.
Delete
to delete the
Click the name of the administrator group, and view its description and
permission set.
Associated
Administra
tors
Issue 01 (2015-07-20)
224
9 System Management
Procedure
Step 1 10.1.3.2 Modifying an Administrator Group.
Step 2 Click
Step 3 Configure the basic information and permission set for the new administrator group.
Enter the name and information about the administrator group in Name and Description
respectively. Select a permission in the Permission Set navigation tree.
Step 4 Click OK.
----End
Context
The three default administrator groups administrator, operator, and auditor are not allowed
to modify.
Procedure
Step 1 Choose System > System Administrators > Administrator Groups .
Step 2 Click
Step 3 Modify the description or permission set of the administrator group on the Modify
Administrator Group page.
Enter information about the administrator group in Description, and select a permission in the
Permission Set navigation tree.
Step 4 Click OK.
----End
Prerequisites
To view the online administrators, the current administrator must have the permission to
view the online administrators.
To forcibly log off an online administrator, the current administrator must have the
permission to forcibly log off an online administrator.
Issue 01 (2015-07-20)
225
9 System Management
Context
Session is the connection set up between the browser and the server. One administrator can
generate multiple sessions. The forcible logoff operation is applicable to only the
administrator that generates the session concerned. For example, administrator user logs in to
the same server from clients A and B and generates sessions a and b. When you forcibly log
off the administrator user that generates session a, the administrator user that generates
session b will not be affected.
Procedure
Step 1 Choose System > System Administrators > Online Administrator .
Step 2 Do as follows to view the online administrators and their login information on the Online
Administrators page.
Click
in the upper right corner of the page. The latest online administrators and
their login information are displayed.
To forcibly log off an online administrator, select the administrator and click
. In the displayed confirmation dialog box, click OK.
----End
Procedure
Step 1 Choose System > System Administrators > Security Policy .
Step 2 Click
Issue 01 (2015-07-20)
226
9 System Management
Step 3 Set the security policy parameters on the Modify Security Policy page, as described in Table
10-2.
Table 9-2 Security policy parameters
Parameter
Description
Value
Minimum length
Default value: 8
characters.
You are not advised
to set Minimum
length to 1
characters.
Otherwise, the
password is easy to
crack.
Complexity
Issue 01 (2015-07-20)
227
Parameter
9 System Management
Description
Value
crack.
Set a validity
period for the
password
This function is
disabled by default.
Useful-life (days)
Timeout (minutes)
Allow Intercurrent
Login
Default value:
Disabled.
Incorrect password
lock
Default value:
Enabled.
Allowed attempts
Default value: 5.
NOTE
After the administrator is locked, it can be
manually unlocked by the default administrator
admin or another administrator who has the
unlock permission, or automatically unlocked
after the lock time is up.
Default value: 3.
Lock permanently
Issue 01 (2015-07-20)
228
9 System Management
Parameter
Description
Value
Lock (minutes)
Default value: 3.
For example, because
the administrator test
enters incorrect
passwords for more
than Allowed
attempts times, the
administrator is
locked automatically.
If Lock (minutes) is
set 3, the
administrator will be
unlocked
automatically three
minutes later.
Prerequisites
An authentication server is available.
Procedure
Step 1 Choose System > System Administrators > Authentication Server.
Step 2 Click
Issue 01 (2015-07-20)
229
9 System Management
Step 3 On the Modify RADIUS Server page, set RADIUS server parameters that are listed in Table
10-3.
Table 9-3 Configuring the RADIUS server
Parameter
Description
Value
Auth mode
Spare IP
address
Port
Shared key
Encrypts RADIUS
authentication packets to
safeguard authentication
information during transfer.
Issue 01 (2015-07-20)
230
Parameter
9 System Management
Description
Value
Main and spare RAIDIUS servers need
to use the same shared key.
Procedure
Step 1 Choose System > System Maintenance > Performance Monitoring.
Step 2 Set the usage thresholds for the server.
1.
Click
2.
The Modify Threshold page is displayed. Set the usage thresholds for the server on this
page.Table 10-4 lists the default thresholds.
Default Threshold
90%
90%
90%
90%
3.
Click OK.
Return to the System Performance page when the threshold is modified successfully.
Step 3 Monitor the server and database performance on the System Performance group box, as
shown in Table 10-5.
The system collects the server and database performance data periodically.
Issue 01 (2015-07-20)
231
9 System Management
Description
CPU
If the CPU usage has exceeded the threshold for three consecutive times, the
ATIC Management center generates an alarm. When the CPU usage
becomes lower than the threshold, the alarm is cleared automatically.
The red line represents the threshold.
Memory
If the memory usage has exceeded the threshold for three consecutive times,
the ATIC Management center generates an alarm. When the memory usage
becomes lower than the threshold, the alarm is cleared automatically.
The red line represents the threshold.
Disk
If the disk usage exceeds the threshold, the ATIC Management center
generates an alarm. When the disk usage becomes lower than the threshold,
the alarm is cleared automatically.
Database
The MySQL database capacity will grow automatically with the data
amount. In this case, you should check whether the used capacity is too
large. Insufficient remaining disk spaces of the database will cause the
improper operating of the database and ATIC Management center.
----End
Context
The dumped operation logs are saved to the Installation
directory/Runtime/LegoRuntime/datastorage/sysoptlog path on the ATIC Management
center server. You can set the dumping period for the logs and the number of recent days in
which logs are reserved. For example, if the log dumping period is set to 30 days, the logs in
the recent 90 days are set to reserve, and the dumping is set to start at 02:00:00, the ATIC
Management center dumps the operation logs generated 90 days ago, the database deletes the
dumped logs and reserves only operations logs in the recent 90 days, and the ATIC
Management center performs the next dumping 30 days after the last dumping.
Procedure
Step 1 Choose System > System Maintenance > Log Dump.
Step 2 Click
Issue 01 (2015-07-20)
232
9 System Management
Description
Recommended Value
Dumped schedule
Issue 01 (2015-07-20)
233
9 System Management
Parameter
Description
Recommended Value
File format
Language
Result
When the specified dumping period and dumping time reaches, the ATIC Management center
automatically dumps the operation logs to the Installation
directory/Runtime/LegoRuntime/datastorage/sysoptlog path on the ATIC Management
center server. The dumped logs will not be displayed in System Logs but stored in the
specified directory. To view the dumped logs, you can download the dumped logs in a file on
the client and open the file in the text editing tool.
Follow-up Procedure
1.
You can view the dumping records in the Historical Dumps area.
2.
(Optional) You can click the compression package of the dumped logs to save the logs to
the specified path on the client.
3.
(Optional) You can select the dumped logs that do not need to reserve and click
to delete the logs from the ATIC Management center server.
Context
The ATIC Management center dumps the alarms stored in the database to the File dump path
displayed on the interface according to the specified dumping period. You can set the
dumping period for the alarms and the number of recent days in which alarms are reserved.
For example, if the log dumping period is set to 30 days, the alarms in the recent 90 days are
set to reserve, and the dumping is set to start at 02:00:00, the ATIC Management center dumps
the alarms generated 90 days ago, the database deletes the dumped alarms and reserves only
Issue 01 (2015-07-20)
234
9 System Management
alarms in the recent 90 days, and the ATIC Management center performs the next dumping 30
days after the last dumping.
Procedure
Step 1 Choose System > System Maintenance > Alarm Dump.
Step 2 Click
Description
Recommended Value
Dumped schedule
Issue 01 (2015-07-20)
Parameter
9 System Management
Description
Recommended Value
the records generated 90
days ago, the database
deletes them.
File format
-.
Language
Result
When the specified dumping period and dumping time reaches, the ATIC Management center
automatically dumps the alarms to the File dump path displayed on the interface. The
dumped alarms will not be displayed in Past Alarms but stored in the specified directory. To
view the dumped alarms, you can download the dumped alarms in a file on the client and
open the file in the text editing tool.
Follow-up Procedure
1.
You can view the dumping records in the Historical Dumps area.
2.
(Optional) You can click the compression package of the dumped alarms to save the
alarms to the specified path on the client.
3.
(Optional) You can select the dumped alarms that do not need to reserve and click
to delete the dumped alarms from the ATIC Management center server.
Procedure
Step 1 Choose System > System Maintenance > Anti-DDoS Data Maintenance.
Step 2 On the Anti-DDoS Data Maintenance page, click
Issue 01 (2015-07-20)
236
9 System Management
Step 3 On the Modify Anti-DDoS Data Maintenance Settings page, set parameters by referring to
Table 10-8.
Table 9-8 Parameters of maintaining anti-DDoS data
Parameter
Description
Value
Hourly summary
data (months)
Traffic diversion
log (days)
Scheduled daily
reports (days)
Issue 01 (2015-07-20)
237
Parameter
9 System Management
Description
Value
Scheduled monthly
reports (years)
Scheduled yearly
reports (years)
The number of
pagesize
Context
ATIC management center can support the configuration backup and some status information
backup.
Issue 01 (2015-07-20)
238
9 System Management
Ensure that other administrators are offline during the database backup. Otherwise, operating
the database by them may interrupt the backup.
Choose System > System Administrators > Online Administrator to check whether other
administrators are online.
Procedure
Step 1 Choose System > System Maintenance > System Backup.
Step 2 Click
Step 3 On the Back Up Current Configuration File page, enter the description and click OK to
back up the current system configuration.
The system automatically generates a configuration file name, consisting of the database
name and backup time. The description illustrates the configuration file in detail.
Step 4 In the dialog box that is displayed, click OK.
----End
Context
ATIC management center can only be restored by the configuration file with the same version.
If the configuration of Zones or sysnames is different from that before restoration, the admin
must check and reallocate management permissions of these Zones or sysnames. Otherwise,
other administrators cannot manage the restored configuration.
Procedure
Step 1 Choose System > System Maintenance > System Backup.
Step 2 Click
and terminate services on the ATIC management center as prompted.
Then click OK to start restoring the configuration file.
Step 3 When the configuration file is restored, click OK and close the dialog box.
Step 4 Re-log in to the ATIC Management center. Choose System > System Maintenance >
System Backup to check whether restored configurations are correct.
Issue 01 (2015-07-20)
239
9 System Management
Click OK. Please continue with the following steps to make sure that ATIC Management
center and anti-DDoS device is consistent after configuration is restored.
a.
b.
Click
Choose System > System Maintenance > System Backup. The Check System
Status page is displayed.
b.
In the Check System Status dialog box, click Roll Back Configuration to roll
back system configurations.
c.
----End
Follow-up Procedure
Confirm configurations no matter whether restoring or rolling back them succeeds.
1.
Choose System > System Maintenance > System Backup. The Check System Status
page is displayed.
2.
In the Check System Status dialog box, click The restoration succeeded..
Issue 01 (2015-07-20)
240
9 System Management
Export
Set the conditions and click Search to search for the desired logs. For details
about this operation, see 10.3.2 Searching for an Operation Log, 10.3.3
Querying Device Operation Logs, and 10.3.4 Querying Syslog Interworking
Logs.
Select the logs to save to the local computer and click
. In the
displayed dialog box, select a path for saving the operation log file, enter a
name for the file or use the default file name, and click Save to save the
selected logs to the specified local path.
NOTE
If the Internet Explorer executes the default security policy, the To help protect you
security, Internet Explorer blocked this site from downloading file from to your
computer message is displayed upon an export operation. In this case, right-click the
message, and choose Download File from the shortcut menu. After the interface is
refreshed, export the event information again.
Export
all
Click
. In the displayed dialog box, select a path for saving the
operation log file, enter a name for the file or use the default file name, and
click Save to save all the logs to the specified local path.
Issue 01 (2015-07-20)
241
9 System Management
The operation log level identifies the criticality of a log. The operation log level can be danger,
minor, warning, or info from the most critical to the least critical. Table 10-9 defines the
different levels of logs.
Table 9-9 Log levels
Level
Definition
Danger
Refers to the operations that make the whole system or function modules faulty
or unavailable.
Warning
Minor
Info
The ATIC management center allows you to view device operation logs and filter the
logs based on the logging start time, end time, device IP address, terminal IP address,
VTY interface, user name, VRF, and command line.
Device operation logs can be used to monitor the device or locate faults.
Device operation logs take up large database space and cannot be exported or dumped.
You can specify a period of time on the Anti-DDoS Data Maintenance page to
regularly delete the reserved device operation logs. The device operation logs are
retained for 90 days by default.
Procedure
Step 1 Choose System > Log Management > System Logs.
Step 2 Set the conditions for searching for operation logs.
Issue 01 (2015-07-20)
You can select Search to use the basic search method. Table 10-10 describes the
parameters of the basic search conditions.
242
9 System Management
Description
Recommended Value
Level
You can select Advanced Search to use the advanced search method. Table 10-11
describes the parameters of the advanced search conditions.
Description
Recommended Value
Level
Type
Category of an operation
log.
The logs are categorized
based on the function of a
component. For example,
the log of creating a
collection rule task belongs
to the performance
management category.
Result
Issue 01 (2015-07-20)
243
Parameter
9 System Management
Description
Recommended Value
----End
Procedure
Step 1 Choose System > Log Management > Device Logs.
Step 2 Query device operation logs by using the basic search or advanced search.
Basic search
Enter the device IP address or Command to be queried and click
the logs matching given conditions.
to display
Advanced search
a.
b.
In the Advanced Search group box, set search conditions and click Search. For the
parameters of search conditions, see Table 10-12.
Description
Start Time
End Time
Device IP
Terminal IP
User
Command
----End
Issue 01 (2015-07-20)
244
9 System Management
Procedure
Step 1 Choose System > Log Management > Syslog-linkage Log.
Step 2 Set the conditions for querying syslog interworking logs.
When you select Search, set the log query conditions based on the parameter description
in Table 10-13.
Table 9-13 Description of the parameters for querying syslog interworking logs
Parameter
Description
Detail
When you select Search, set the log query conditions based on the parameter description
in Table 10-14.
Table 9-14 Description of the parameters for advanced query of syslog interworking logs
Parameter
Description
Start Time
End Time
Device IP
Detail
----End
Prerequisites
When a mail server is configured, ensure that the SMTP/POP3 function is enabled for sender
accounts registered on the server.
Issue 01 (2015-07-20)
245
9 System Management
Context
The proxy server supports only the SOCKS 5 proxy when you configure the basic information
for the mail server.
The SOCKS protocol enables the client/server application programs in the TCP and UDP
domains to conveniently and securely use the network firewall. The proxy server that uses the
SOCKS protocol is called the SOCKS server and is a universal proxy server. The SOCKS
proxy is usually used in the email and is bound to port 1080 on the proxy server. If the
SOCKS proxy service requires identity authentication, you need to apply to the network
administrator for a user name and password.
Procedure
Step 1 Choose System > Notification Server > Email Server.
Step 2 Configure the basic information for the mail server.
1.
2.
Configure the basic information for the mail server, as described in Table 10-15.
Description
Recommended Value
SMTP server
Server port
Sender email
Test email
Username
Issue 01 (2015-07-20)
246
9 System Management
Parameter
Description
Recommended Value
After the parameters are specified, you can click Test to check whether the testing email box can receive
the testing message.
3.
If yes, the communication between the ATIC Management center server and the mail server is
normal .
If no, an error message will be displayed. Handle the exception according to the message.
Click OK.
----End
Procedure
Step 1 Choose System > Notification Server > SMS Server.
Step 2 In the SMS Server area, click
Description
Recommended Value
Issue 01 (2015-07-20)
247
Parameter
9 System Management
Description
Recommended Value
Baud usage
Country code
[For example]
Unicom provider
Customized configuration of
the Unicom SMS server
You can click Test to check whether the testing mobile phone can receive the testing message.
If yes, the communication between the ATIC Management center server and the SMS modem is
normal.
If no, an error message will be displayed. Handle the exception according to the message.
----End
Procedure
Step 1 Choose System > Notification Server > Syslog Server .
Step 2 Set basic information of the log server.
Issue 01 (2015-07-20)
248
9 System Management
1.
Click
2.
Set basic parameters of the log server. For details, see Table 10-17.
Description
Recommended Value
Server IP
Server port
----End
Issue 01 (2015-07-20)
249