ATIC MGMT
ATIC MGMT
ATIC MGMT
V500R001
Configuration Guide
Contents
1. Safety Information...............................................................................................................................7
2. Initial configuration of the management center......................................................................................8
2.1. Logging In to the ATIC Management center.....................................................................................8
2.2. Customizing a Homepage.................................................................................................................9
2.3 Adding Devices................................................................................................................................10
2.3.1 Creating an Anti-DDoS..............................................................................................................10
2.3.2 Creating an SAS.........................................................................................................................14
2.3.3. Creating an Syslog-linkage Device............................................................................................16
2.4. Configuring a Collector...............................................................................................................18
2.4.1 Adding a Collector.....................................................................................................................20
2.4.2 Associating the Collector with the devices...............................................................................21
2.5. Configuring the Defense Group......................................................................................................22
3. Configuring Defense Policies.................................................................................................................26
3.1. Configuring the Zone......................................................................................................................26
3.1.1 Adding a Zone...............................................................................................................................27
3.1.2. Importing Zones in a Batch......................................................................................................32
3.2. Configuring the Zone-based Defense Policy...................................................................................33
3.2.1 Configuring a Defense Mode....................................................................................................37
3.2.2. Configuring a Filter..................................................................................................................40
3.2.2.1 Creating a Filter.....................................................................................................................42
3.2.2.2 Associating a Zone with a Filter.............................................................................................48
3.2.3 Configuring a Location Blocking Policy......................................................................................49
3.2.4. Creating a Service and a Defense Policy..................................................................................50
3.2.4.1. Overview...............................................................................................................................53
3.2.4.2 Configuring a Service Learning Task.......................................................................................54
3.2.4.3. Applying Service Learning Results.........................................................................................56
3.2.5. Adjusting a Threshold (by Baseline Learning)..........................................................................57
3.2.5.1. Description............................................................................................................................58
3.2.5.2 Configuring a Baseline Learning Task.....................................................................................59
3.2.5.3 Applying Baseline Learning Results........................................................................................62
3.2.6. Configuring the Zone-based Defense Policy............................................................................63
3.2.6.1. TCP Defense Policy................................................................................................................63
3.2.6.2. UDP Defense Policy...............................................................................................................68
3.2.6.3. ICMP Defense Policy.............................................................................................................69
5.2.6.4 Other Defense Policy.............................................................................................................69
3.2.6.5 DNS Defense Policy................................................................................................................70
3.2.6.6 SIP Defense Policy..................................................................................................................73
3.2.6.7 HTTP Defense Policy..............................................................................................................73
3.2.6.8 HTTPS Defense Policy............................................................................................................78
3.2.6.9. Top N Study..........................................................................................................................80
3.2.7. Configuring Global Defense Policies (ATIC)..............................................................................85
3.2.7.1. Configuring Basic Attack Defense.........................................................................................85
3.2.7.2. Blacklist and Whitelist...........................................................................................................88
3.2.8. Creating User-defined IP Locations..........................................................................................89
3.2.9. Library Files..............................................................................................................................89
3.2.10. Configuring Policy Templates.................................................................................................91
3.2.11. Cloud Cleaning.......................................................................................................................93
3.2.12 Deploying the Defense Policy.................................................................................................96
3.2.13 Saving Configurations.............................................................................................................97
4. Configuring Traffic Diversion.................................................................................................................98
4.1. Configuring Mirroring.................................................................................................................98
4.2. Configuring Traffic Diversion.........................................................................................................100
4.2.1. Configuring Policy-based Route Diversion.............................................................................100
4.2.2 Configuring BGP Traffic Diversion (CLI)...................................................................................103
4.2.3 Configuring BGP Traffic Diversion (ATIC).................................................................................110
4.3. Configuring Traffic Injection..........................................................................................................114
4.3.1 Layer-2 Injection.....................................................................................................................114
4.3.2. Configuring Static Route Injection.........................................................................................117
4.3.3. Configuring UNR Route Injection...........................................................................................120
4.3.4. Configuring Policy-Based Route Injection..............................................................................124
4.3.5 Configuring GRE Traffic Injection............................................................................................129
4.3.6 Configuring MPLS LPS Traffic Injection....................................................................................133
4.3.7 Configuring MPLS VPN Traffic Injection..................................................................................137
4.4 Configuring the Loop Check Function............................................................................................143
4.5. Configuring Blackhole Traffic Diversion........................................................................................144
5. Attack Response and Source Tracing...................................................................................................146
5.1. Viewing the Status of a Zone and Anti-DDoS Alarms....................................................................146
5.2 Handling Abnormal Events............................................................................................................146
5.3. Packet Capture.............................................................................................................................147
5.3.1 Packet Capture, Analysis and Report......................................................................................147
5.3.2 Configuring Packet Capture Length........................................................................................151
5.3.3 Managing Packet Capture Task...............................................................................................152
5.3.4 Managing Packet Capture File................................................................................................165
5.3.4.1 Viewing Anomaly or Attack Events......................................................................................166
5.3.4.2 Tracing Attack Sources Through a Packet Capture File........................................................167
5.3.4.4 Extracting Fingerprints from a Packet Capture File..............................................................170
5.3.4.5 Downloading a Packet Capture File.....................................................................................171
6. Report..................................................................................................................................................173
6.1 Overview........................................................................................................................................173
6.2. Traffic Analysis..............................................................................................................................173
6.2.1 Data Overview........................................................................................................................173
6.2.2. Traffic Comparison.................................................................................................................176
6.2.3. Traffic Top N..........................................................................................................................178
6.2.4. Application Traffic..................................................................................................................184
6.2.5. Protocol Traffic Distribution...................................................................................................187
6.2.6. Number of TCP Connections..................................................................................................190
6.2.7. Board Traffic..........................................................................................................................193
6.2.8. IP Location Top N...................................................................................................................195
6.2.9. IP Location Traffic..................................................................................................................197
6.3. Anomaly/Attack Analysis..............................................................................................................200
6.3.1 Anomaly/Attack Details..........................................................................................................200
6.3.2 Anomaly/Attack Top N............................................................................................................202
6.3.3. Attack Top N..........................................................................................................................206
6.3.4. Distribution of Anomaly/Attack Types...................................................................................208
6.3.5. Packet Discarding Trend........................................................................................................210
6.4. DNS Analysis.................................................................................................................................212
6.4.1. Top N Request Trend.............................................................................................................213
6.4.2. Top N Response Trend...........................................................................................................215
6.4.3. Cache Request Trend.............................................................................................................218
6.4.4. Request Category Trend........................................................................................................220
6.4.5. Resolution Success Ratio........................................................................................................223
6.4.6. Abnormal Packet Analysis......................................................................................................225
6.5. HTTP(S) Analysis...........................................................................................................................228
6.5.1. Top N HTTP Request Sources by Traffic.................................................................................228
6.5.2. Top N HTTPS Request Sources by Traffic...............................................................................231
6.5.3. Top N Requested URl.............................................................................................................234
6.5.4. Top N Requested Host...........................................................................................................236
6.6. Comprehensive Report.................................................................................................................238
6.6.1. Querying Comprehensive Reports.........................................................................................238
6.6.2. Managing Scheduled Task......................................................................................................242
6.6.2.1. Creating a Scheduled Task..................................................................................................243
6.6.3. Downloading Report..............................................................................................................246
6.7. Report Customization...................................................................................................................246
6.7.1. Customizing Report-Related Information..............................................................................246
6.7.2. Configuring IP Description.....................................................................................................247
7. System Management...........................................................................................................................249
7.1. Configuring the System Administrators........................................................................................249
7.1.1. Introduction to System Administrators..................................................................................249
7.1.2. Managing Administrators......................................................................................................250
5.1.2.1. Creating an Administrator..................................................................................................251
7.1.2.2. Modifying an Administrator Group.....................................................................................255
7.1.3. Managing Administrator Groups...........................................................................................256
7.1.3.1. Creating an Administrator Group........................................................................................257
7.1.3.2. Modifying an Administrator Group.....................................................................................257
----End..............................................................................................................................................258
7.1.4. Managing Online Administrators...........................................................................................258
7.1.5. Configuring the System Security Policy..................................................................................259
7.1.6. Configuring the Authentication Server..................................................................................262
7.2. System Maintenance....................................................................................................................264
7.2.1. Performance Monitoring.......................................................................................................264
7.2.2 Dumping the Operation Logs..................................................................................................266
7.2.3. Dumping the Alarms..............................................................................................................269
7.2.4. Maintaining Anti-DDoS Data..................................................................................................271
7.2.5. Backing Up and Restoring Configuration Files.......................................................................274
7.2.5.1. Backing Up a Configuration File..........................................................................................274
7.2.5.2. Restoring a Configuration File.............................................................................................275
7.3. Log Management..........................................................................................................................277
7.3.1. Introduction to Log Management..........................................................................................277
7.3.2. Searching for an Operation Log.............................................................................................279
----End..............................................................................................................................................280
7.3.3. Querying Device Operation Logs............................................................................................281
7.3.4. Querying Syslog Interworking Logs........................................................................................281
7.4. Notification Server........................................................................................................................282
7.4.1. Mail Server.............................................................................................................................282
7.4.2. SMS Server.............................................................................................................................285
7.4.3. Syslog Server..........................................................................................................................286
1. Safety Information
Observe the safety information to ensure the normal operating of the ATIC.
Hardware Operations
It is recommended to configure an independent uninterrupted power supply (UPS) for the ATIC
server, protecting the hardware, system, and data from unexpected power failure. If the ATIC server
is not configured with the UPS, the administrator must properly close the ATIC process, database,
and power one by one before the power cut after receiving the notice for upcoming power cut.
To shut down the ATIC server, you must follow the proper shutdown method in all situations. It is
forbidden to switch off the hardware power directly to shut down the ATIC server; otherwise, the
system recovery failure will be caused.
It is recommended to check the network communication every day according to the daily
maintenance items to protect the network communication from disruption.
It is forbidden to remove the network cable from the server at will when the ATIC is running. If you
really need to remove the network cable, stop the ATIC service first.
Software Operations
Do not install unnecessary software on the ATIC server.
Do not use the ATIC server to browse Web pages. Do not set unnecessary sharing directory.
Ensure that the permissions on the sharing directory are specified.
Do not connect other computers to the network where the ATIC server resides to avoid IP
address conflict and virus infection.
Set the properties of the OS, database, and ATIC passwords by level, and assign the passwords
to the maintenance owner only. Only the maintenance owner has the administrator password.
Passwords should be strictly managed with clear properties.
Check and test the ATIC periodically according to the maintenance item list and make a record
of the check. After you discover a problem, handle it in time. For the problems that cannot be
solved, contact the local office or customer service center in time to solve them.
ATIC Operations
It is forbidden to change the system time when the ATIC is running. Set the system time before
you install the ATIC. Shut down the ATIC server before you change the system time. Restart the
ATIC server after the system time is changed. Do not set the system clock of the server ahead;
otherwise, data mess will be caused.
To log in to Windows, you must use the user name that was used to install the ATIC. Do not
change the user name for logging in to Windows.
During the use of the ATIC, ensure that data on the NE and that on the ATIC are consistent.
Back up database periodically to minimize the system loss when errors occur.
It is recommended to synchronize NE data to the ATIC and query the latest NE data before you
set parameters.
The ATIC will display a message for dangerous operations. Please notice such warnings.
Do not set the NE to a language except Chinese and English; otherwise, the search results will be
displayed as garbles on the ATIC interface.
Prerequisites
The installation of the ATIC Management center server software is complete.
Context
Upon the first login, use the default super administrator account admin and password Admin@123.
Procedure
Step 1: Open the Web browser.
The ATIC Management center supports Internet Explorer 8.0, Firefox 3.6, and the Firefox
browser of later versions.
Step 2: Enter https://server IP address: port (the port can be omitted if port 443 is used.) in the
address bar and press Enter.
Step 3: Select a language on the login page and enter the correct user name, password, and
verification code.
The default user name is admin and its password is Admin@123.
Step 4: Click Log In.
Step 5: The system prompts that Initial login. Please change your password. on the Web page. Enter
a new password and confirm it. Then click OK.
Step 6: Click OK in the Succeeded dialog box.
----End
2.2. Customizing a Homepage
By customizing a homepage, you can place real-time interface traffic comparison, zone traffic
comparison, and alarm monitoring on the homepage.
Context
The administrator can query only customized content.
Procedure
Step 2: Click .
Step 3: On the Create Homepage Customization Profile page, select the content to be customized,
set given conditions, and click OK.
The customized content is displayed on the homepage.
Interface traffic and Zone traffic are refreshed every 10 seconds, and every 70 seconds
respectively. The homepage displays only several latest alarms.
Step 4: Drag the customized content to a proper position and click to save the current
layout.
----End
2.3 Adding Devices
A device must be added before you can perform other operations.
2.3.1 Creating an Anti-DDoS
After the communication between the ATIC Management center and the Anti-DDoS is established
through SNMP, you can add the Anti-DDoS.
Prerequisites
The IP address segments of the Anti-DDoS devices are known.
The communication has been set up between the ATIC Management center server and the Anti-
DDoS devices.
Procedure
Step 1: Choose Defense > Network Settings > Devices.
Step 2: Click .
Step 3: In the Basic Information group box, set the name and IP address of an Anti-DDoS
device and set Device Type to Anti-DDoS.
When you select Telnet, the ATIC Management center uses port 23 for accessing
Anti-DDoS devices through Telnet by default. In this case, enter the name and
password of a Telnet user for authentication.
When you select STelnet, the ATIC Management center uses port 22 for accessing
Anti-DDoS devices through STelnet by default. In this case, enter the name and
password of an STelnet user for authentication.
Authentication Protocol used for verifying messages. You can select the
protocol The parameter value can be authentication
the HMACMD5 or HMACSHA protocol or protocol as
no protocol. If required.
the HMACMD5 or HMACSHA protocol is 1. HMACMD5
selected, you need to set the converts the
authentication password. character
string in any
order based on
the hash
algorithm and
produces a
128-bit
message
digest, in
integer format.
2. HMACSHA
Parameter Description Recommended
Value
possesses
higher security
than
HMACMD5.
HMACSHA
produces a
160-bit
message digest
for the binary
messages not
longer than
264 bits.
Data encryption Encryption protocol used when You can select the
protocol encapsulating data. encryption
The parameter value can be protocol as
the DES or AES encryption protocol or no required.
encryption. If the DES or AES encryption 1. DES: It indicates
protocol is selected, you need to set the the Data
encryption password. Encryption
Standard
(DES), which is
an
international
encryption
algorithm with
the key length
of 56
characters.
2. AES: It indicates
the Advanced
Encryption
Standard (AES).
There are
three types of
key lengths of
128
characters..
Parameter Description Recommended
Value
----End
Result
Each Anti-DDoS device is automatically synchronized once it is added. If synchronization fails, rectify the
fault as prompted and synchronize Anti-DDoS devices manually with the ATIC Management center.
Follow-up Procedure
If only one collector is available, the new Anti-DDoS devices are automatically associated with the
collector. If multiple collectors are available, associate Anti-DDoS devices with the given collector.
2.3.2. Creating an SAS
When the SIG1000E /9280E serves as a detecting device, add the Service Analysis Server (SAS) to the
ATIC Management center. To enable the ATIC Management center to synchronize Zones on
the SIG1000E/9280E, configure the SIG1000E/ 9280E database of the SAS on the ATIC Management
center. Ensure that the configured database is the same as the SIG1000E/9280E database on the SAS.
Prerequisites
Before you create an SAS, ensure that the following are available:
1. IP addresses of devices
3. IP connectivity between the ATIC management center and the device
Context
The Service Analysis Server (SAS) is the service processing center of the SIG1000E/9280E system. It is
responsible for receiving and analyzing service information reported by the SRS, and saving the
information to the database. ATIC Management center needs to synchronize the Zone on the
SIG1000E/9280E device using the SAS database.
Procedure
Step 1: Choose Defense > Network Settings > Devices.
Step 2: Click .
Step 3: In the Basic Information group box, set the name and IP address of a device and select SIG
SAS for Device Type.
Step 4: Configure the parameters. For details, see Table 2-2,
Step 5: Click OK.
----End
When the Syslog-linkage devices act as a detecting device, add the Syslog-linkage Device to the ATIC
Management center.
Prerequisites
Before you create a Syslog-linkage Device, ensure that the following are available:
IP addresses of devices
IP connectivity between the ATIC management center and the device
Context
The Syslog-linkage Device analyzes traffic and sends logs to the ATIC Management center. After
analyzing anomaly logs reported by the Syslog-linkage device, the ATIC Management center generates a
traffic diversion task and delivers it to the cleaning device in the same defense group.
Procedure
Step 1: Choose Defense > Network Settings > Devices.
2.4. Configuring a Collector
The management center is comprised of ATIC server and collectors. The
collectors collect, parse, summarize, and store traffic and logs from anti-DDoS
devices. Therefore, collectors need to be added to the ATIC during the
configuration of anti-DDoS services. You can view the performance data of the
added anti-DDoS collectors, modify the collectors, or delete them.
Choose Defense > Network Settings > Collectors, and manage collectors.
Create
Click to add a collector in the ATIC Management center. For
details, see 2.4.1 Adding a Collector.
Associate Click of a collector and bind the collector to one or more anti-DDoS
Device devices. For details, see 2.4.2 Associating the Collector with the devices.
Select the check box on the title bar and click above the
list to delete all collectors.
NOTE
Collectors being associated with the device cannot be deleted.
2.4.1 Adding a Collector
After the centralized installation is complete, the ATIC Management center automatically creates a collector.
You must manually create collectors during the distributed installation.
Procedure
Step 1: Choose Defense > Network Settings > Collectors.
Step 4: Set other parameters of the collector. For details, see Table 2-3.
Encryption Key Indicates the key content. Before configuring a packet capture
task, configure an encryption key for
packet capture logs.
When the collector is associated with
an anti-DDoS device, deliver the key to
the anti-DDoS device.
Step 5: Optional: On the Create Collector page, click Test.
2. If the system displays Failed to connect the collector Possible causes: The IP
address of the collector is incorrect, or the collector is not started, or the
connectivity error occurs. The ATIC Management center and collector cannot be
normally connected. Perform the check according to the displayed cause .
Follow-up Procedure
You can view, modify, or delete a collector by referring to 2.4 configuring a Collector.
Prerequisites
1. The device and anti-DDoS collector are routable to each other.
2. Devices have be added. For details on how to add devices, see 2.3 Adding Devices.
3. The anti-DDoS collector has been added. For details on how to add the anti-DDoS collector, see 2.4.1
adding a Collector.
Procedure
Step 1: Choose Defense > Network Settings > Collectors.
Step 4: On the Select Device page, select the check box of the device to be
associated.
Step 5: Click OK.
----End
Management Operation
Choose Defense > Network Settings > Defense Group, and manage defense groups.
Create
Click to create a defense group. For details, see Creating a
Defense Group.
Modify Click of the defense group to be modified to modify the defense group.
Select the check box on the title bar and click above the list to
delete all defense groups.
View 1. Click the name of the defense group to be viewed for its basic
information and device information.
2. Click Close to close the dialog box.
Step 3: Set the basic parameters of the defense group. For details, see Table 2-4.
defense be null.
group.
identifying
a defense
group.
2. On the Select Device page that is displayed, select the check box of a device and click OK.
After successfully added, the device is displayed in the device list on the Create Defense
Group page.
2. In the device list, you can select an device and click to delete the device; you can
select the check box on the title bar and click to delete all devices.
----End
3. Configuring Defense Policies
3.1. Configuring the Zone
Before you configure an anti-DDoS policy traffic security policy, add Zones to be protected by anti-DDoS
devices. The ATIC Management center provides refined and differentiated filtering and protection for
different Zones.
Create
Click to add a Zone. For details, see 3.1.1 Adding a Zone.
Modify Click of the Zone to be modified, and modify the Zone. For the
parameter description, see 3.1.1 Adding a Zone.
Delete NOTICE
Once the Zone is deleted, all the services, policies, packet-capturing tasks,
diversion tasks, baseline-learning tasks, and service-learning tasks under
the Zone will be deleted, and the Zone will be undeployed from all
associated devices. Perform this operation with caution.
2. Select the check box on the title bar and click above the list to
delete all Zones.
Export
1. Select one or more Zones and click .
2. On the File Download page, click Open to view the Zone list or
click Save to save the list to the local.
Export
All 1. Click .
2. On the File Download page, click Open to view the Zone list or
click Save to save the list to the local.
Import Click to import Zones in a batch. For details, see 3.1.2 Importing
Zones in a Batch.
NOTE
SIG Zones are VICs synchronized from the SIG1000E/9280E and cannot be
imported..
View 1. Click the account or name of the Zone to be viewed for its basic
information and IP address.
2. Click Close to close the dialog box.
Search 1. Basic search
On the upper right of the page, enter the account/name of the Zone to
be searched for and click . The Zone that meets search
conditions are displayed on the page.
2. Advanced search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions
such as Account/Name, Type, or IP Address, and then click Search.
3.1.1 Adding a Zone
IP addresses protected by anti-DDoS devices are identified and grouped by adding a Zone. Then
Zone-specific policies can be configured to achieve differentiated and hierarchical defense.
Prerequisites
To add a Zone and associate it with devices, ensure that devices associated with the Zone have been
discovered by the ATIC Management center.
Context
The Zones are classified into user-defined Zones, default Zones, and SIG1000E/9280E Zones.
User-Defined Zones
To protect specific IP addresses/address segments, the administrator can manually create user-defined
Zones and add the IP addresses/address segments to the user-defined Zones. The anti-DDoS device uses
defense policies to provide refined defense for traffic of these IP addresses/address segments.
Default Zones
One default Zone is automatically added when you add an anti-DDoS device. Each anti-DDoS device can
be associated with only one default Zone, which does not have any given IP address. Refined defense
can be implemented by the anti-DDoS device on the destination IP addresses except those in User-
Defined Zones.
After the SIG1000E/9280E is added, the system automatically synchronizes Zones from the
SIG1000E/9280E system to protect them. The administrator cannot change the basic information and IP
addresses of Zones of this type, but can select cleaning devices for Zones of this type, and apply the
policies configured for the Zones to the traffic destined for corresponding IP addresses/address
segments for refined defense.
If a network is large or covers multiple areas and each administrator needs to manage one part of the
network, you can create multiple Zones and authorize each administrator the permission of managing
the corresponding Zone.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Step 3: Set the basic parameters of the Zone. For details, see Table 3-1.
Account Indicates the The Zone account consists of letters, digits, and
Zone account. underscores (_) and must start with a letter. It can
neither be any illegitimate characters such
as null and default nor start with sig. It is case
insensitive. Its length cannot exceed 32 characters.
2. Click .
3. Create IP addresses. For details on the parameters, see Table 3-2.
Create Indicates the 1. IP address +Mask: The IP address and mask are
Mode mode of entered to create IP addresses.
creating IP 2. IP address segment: The start and end IP addresses
addresses. are entered to create IP addresses.
4. Click OK.
The new IP address is displayed in the IP Address list.
In the IP Address list, you can select an IP address and click to delete the IP
address; you can select the check box on the title bar and click to delete all IP
addresses.
Step 5: Click the Devices tab to associate devices with the Zone. Select the check box of a device and
click OK. When the Zone is a Service Inspection Gateway (SIG1000E/9280E), the
SIG1000E/9280E is automatically added to the associated device list. To divert the
traffic destined for a Zone to a specific VPN instance of the device, select the VPN
instance in the VPN column.
You can use the default defense policy template or create a defense policy template.
2. Select Packet Capture Task. Then the cleaning device captures the packets discarded due
to attacks upon the Zone. This assists in analyzing attack events.
In the Traffic Diversion Task List group box, click to create IP addresses whose
traffic is to be diverted.
After a static traffic diversion task is delivered, all traffic destined for the IP address is
diverted to the cleaning device.
When you specify certain IP addresses or IP address segments for traffic diversion in a
protected IP address segment, split the IP address segment and select the subnet after
splitting.
b. On the Splitting Setting page, enter the mask splitting length and click Split.
The mask splitting length ranges from 1+number of mask bits to 8+number of mask
bits. For example, the mask of a protected IP address segment is 255.255.0. That is, the
number of mask bits is 16. In this case, the mask splitting length ranges from 17 to 24.
d. Click OK.
Step 7: Click OK to complete the Zone adding on ATIC Management center. Click Deploy to
----End
Follow-up Procedure
You can view, modify, or delete a Zone by referring to Configuring the Zone.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Step 2: Click .
Step 3: On the Import Zone page, click to download the template to the local.
Step 4: Fill in all parameters on the template. For parameter settings, see 3.1.1 adding a Zone.
----End
Follow-up Procedure
You can export Zones, see Configuring the Zone.
Choose Defense > Policy Settings > Zone. On the page that is displayed, you can manage the
defense policies of the Zone. For details, see Table 3-3 and Table 3-4.
Action Description
Configure
Click of the Zone. For details, see 3.2.1 Configuring a Defense
defense
Mode, 3.2.2 Configuring a Filter, and 3.2.6 Configuring the Zone-based
policies
Defense Policy.
Deploy Policies configured for a Zone take effect only after they are deployed
on associated devices.
Select the check box of a Zone and click . For details, 3.2.12
Deploying the Defense Policy.
Parameter Description
Zone Indicates the Zone name defined when you create the Zone. For
details, see 3.1.1 Adding a Zone.
Service Indicates the state of the Zone-associated devices that perform service
Learning learning on traffic.
Click the state value to configure the service learning task or view
service learning results. For details, see 3.2.4.2 Configuring a Service
Learning Task.
Click the state value to configure the baseline learning task or view
baseline learning results. For details, see 3.2.5 Adjusting a Threshold
(by Baseline Learning).
1. Normal: The Zone traffic is normal or the Zone is not associated with
any Anti-DDoS.
2. Abnormal: The Zone traffic does not comply with the normal model.
That is, the traffic exceeds the threshold specified in the defense
policy.
Parameter Description
Defense Indicates the state that the cleaning device processes anomaly or
State attack traffic for the Zone.
3. Not diverted: The traffic that is forwarded to the Zone has not been
diverted to the cleaning device.
1. The diversion state of the Zone is Not diverted and the Zone state
is Abnormal.
Deploymen Indicates the state whether the Zone policy is deployed on devices. The
t State value can be Undeployed, Deploy Succeed, Part Deployed, or Deploy
Failed.
Prerequisites
A Zone has been created. For details, see 3.1 configuring the Zone.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Traffic Indicates the 1. Automatic Perform: The detecting device reports the
Diversion mode in anomaly to the ATIC Management center. Then the
Mode which the ATIC Management center automatically generates a
detecting heartbeat interfaces and the active task and delivers
device the task to the cleaning device.
diverts 2. Manual Perform: The detecting device reports the
anomaly detected traffic anomaly to the ATIC Management
traffic of the center. The ATIC Management center generates a
Zone to the traffic diversion task automatically and does not
cleaning deliver the task to the cleaning device until manual
device. confirmation by the administrator.
NOTE
Cleaning Limits the This function is used by the carrier to provide value-
Bandwidt traffic on added services.
h which Zone-
based attack
defense is
implemente
d below the
threshold.
Excess
packets are
directly
discarded.
Traffic Limits traffic When network bandwidths are limited, you are advised
Limiting of a single IP to enable this function to avoid network congestion.
for Single address of Statistics on the traffic are collected starting from Layer-
IP Address the Zone 2 packet headers, which exclude the packet length at the
below the physical layer. Therefore, the actual traffic volume is
threshold. slightly greater than the specified value.
Excess
packets are
directly
discarded.
Step 4: Click OK.
----End
Follow-up Procedure
Basic policies configured for the Zone take effect only after deployed on associated
devices. For details, see 3.2.12 deploying the Defense Policy.
3.2.2. Configuring a Filter
This section describes how to configure a filter, which is employed by the cleaning device to perform
static filtering over the traffic destined for the Zone.
Filter Category
The Anti-DDoS provides IP, TCP, UDP, HTTP, DNS, ICMP, and SIP filters. For details, see Table 3-6.
The IP filter can process all types of IP packets whereas other filters can only process the packets of their
own types. For example, the HTTP filter can process only HTTP packets.
You can configure a maximum of 128 filters on one anti-DDoS device.
TCP filter Source IP address, destination IP address, packet length, TTL, fingerprint,
DSCP, fragment type, TCP flag bit, source port, and destination port
UDP filter Source IP address, destination IP address, packet length, TTL, fingerprint,
DSCP, fragment type, source port, and destination port
DNS filter Source IP address, destination IP address, packet length, TTL, fingerprint,
DSCP, fragment type, source port, DNS QR (query and reply), and DNS
field (including the domain and type)
Filter Filtering Condition
SIP filter Source IP address, destination IP address, packet length, TTL, fingerprint,
DSCP, fragment type, source port, caller and callee
Filter Template
The ATIC Management center provides 10 common filter templates. You can use any of them as
required.
Operation
Choose Defense > Policy Settings > Filter, and config the filter.
Create
Click to create a filter. For details, see 3.2.2.1 Creating a
Filter.
Modify
Click in the Operation column and modify the filter in the Modify
Filter dialog box.
Delete
Select the check box for the filter and click .
Search Enter part of a filter name or the full name in Name and click
.
3.2.2.1 Creating a Filter
Seven types of filters are available for static filtering based on the user-defined
keyword and action for matched packets.
Procedure
Step 1: Choose Defense > Policy Settings > Filter.
Step 2: Click .
Step 3: On the Basic Information tab page, configure basic information about the
filter. Table 3-7 lists parameters and Table 3-8 lists keywords.
Click the Keyword tab and configure keywords.
d.
destination-ip IP address Indicates You can configure a
the maximum of 100
mask destinati destination IP
on IP addresses on each
address filter and that of
and 2000 destination IP
subnet addresses on each
mask of cleaning device.
a packet.
Both
IPv4 and
IPv6
addresse
s are
supporte
d.
Two modes are available for binding a Zone to a filter. For details, see 3.2.2.2
Associating a Zone with a Filter.
Step 5 Click Deploy.
1. When the Zone is associated with the filter and you click Deploy, the filter is
deployed on the Anti-DDoS and configurations take effect.
2. When only the filter is created and you click Deploy, filter configurations are saved
on the ATIC Management center. They take effect only after the filter is
associated with the Zone and is deployed again.
----End
Step 4: Click .
Step 5: Select the filter to be associated and click OK.
The filter takes effect only after the Zone is deployed.
----End
----End
Prerequisites
The latest IP location database file has been loaded. For details, see 3.2.9 Library Files.
Context
Many Internet attacks are launched by attackers by controlling botnet hosts that may locate in a specific
region. The location blocking policy blocks traffic by region to effectively block attacks from a specific region.
Public IPv4 addresses have been divided by country in the IP location database file. If the IP location division
granularities in the IP location database file cannot meet requirements, you can create user-defined IP
locations. For details, see 3.2.8 Creating User-defined IP Locations.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Prerequisites
The basic policies of the Zone have been configured. For details, see 3.2.1 configuring a Defense Mode.
Context
During traffic cleaning, the cleaning device first matches services by destination IP address, service type,
and destination port. After successful matching, detection and defense are performed according to
service-specific defense policies. Otherwise, detection and defense are performed on default defense
policies by protocol type.
Only traffic limiting can be configured for certain devices in the defense policy of services. In this
case, detection and defense are performed on the traffic of services according to the default
defense policy. The procedure is as follows: When cleaning traffic, the cleaning device first matches
services by service type and destination IP address. After successful matching, the cleaning device
matches the default defense policy by protocol type for detecting and defense. Then the cleaning
device limits traffic according to the traffic limiting policy of services.
Service learning can be used to configure TCP and UDP services. For details, see 3.2.4.2 Configuring a
Service Learning Task.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Step 4: On the Basic Information tab page, configure the basic information of the
service. Table 3-9 shows parameters.
Protocol ID Indicates the protocol ID of the The protocol IDs of TCP, UDP, and
service. GRE are 6, 17, nd 47 respectively.
Destination Indicates the destination port to The value can be a port number
Port be protected. or port range, such as 1024-1030.
1. Click all tabs and configure defense policies for services. For parameters, see 3.2.6
Configuring the Zone-based Defense Policy.
For details on how to manage policy templates globally, see 3.2.10 Configuring Policy
Templates.
Step 7: Click OK.
----End
Example
A server is deployed in a Zone to provide HTTP services by port 8080. To protect this
server, the configuration roadmap of a defense policy is as follows:
2. Create a HTTP service with destination port 8080 and IP address used by the
server to provide HTTP services. The service provides refined defense for HTTP
services.
Follow-up Procedure
1. Services configured for the Zone take effect only after deployed on devices. For details, see 3.2.12
Deploying the Defense Policy.
2. You are advised to enable baseline learning to adjust the threshold configurations of service
policies. For details, see 3.2.5 Adjusting a Threshold (by Baseline Learning).
3.2.4.1. Overview
Service learning and dynamic baseline learning. In service learning, the system learns the service model
(protocol type and port number of the traffic destined for the Zone) of the Zone to enable a proper
attack defense policy.
When multiple ports are enabled for the Zone and refined defense is required for a certain port, you
need to adopt service-based defense to learn about the traffic model and identify Zone services, thereby
providing defense policies for given services in the Zone.
With service learning, the Anti-DDoS can identify the services of the Zone and figure out TCP and UDP
services whose traffic hits the threshold, including the protocol type, port, IP address, and specific traffic
value. In this way, the device obtains the service list of the Zone.
In service learning, the Anti-DDoS learns statistics on inbound traffic, regardless of normal or abnormal
traffic. Therefore, service learning needs to be enabled when Zone traffic is normal. During the learning,
if the Zone is abnormal or under attacks, you need to terminate the current service learning task and
recover it until Zone traffic resumes normal.
3.2.4.2 Configuring a Service Learning Task
You can configure a service learning task to learn TCP or UDP services that hit the traffic threshold within
the specified duration, and select the manual or automatic application of learning results. If the
automatic application is adopted, top N services with heaviest traffic on devices associated with the
Zone can be added to the Zone automatically.
Prerequisites
The user-defined Zones have been added and IP addresses have been configured. For details,
see 3.1.1 Adding a Zone.
The basic policies of the Zone have been configured and deployed on the associated devices.
For details, see 3.2.1 Configuring a Defense Mode.
Devices associated with the Zone have been bound to collectors. For details, see 2.4.2
Associating the Collector with the devices.
Context
To ensure accurate learning results, enable the service learning task when traffic of the Zone is normal.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Start Time Indicates the time devices The start time must be later than
associated with the Zone start the time at which service learning
service learning. is enabled.
End Time Indicates the time devices The end time must be later than
associated with the Zone stop the start time.
service learning.
Step 4: Click Start to enable the service learning task of the Zone.
After service learning is enabled, learning status is displayed as Learning is in progress. You can
click Stop to stop the service learning task.
Before you modify the parameters of the learning task, stop service learning first.
----End
Result
With enabled service learning, if the traffic of a service in the Zone exceeds Traffic Threshold, the
service is displayed in service learning results.
The format of the service name is service type-port number. The traffic volume reaches the upper limit
of the service traffic.
If the confirmation mode of service learning is Automatic confirmation, the system automatically
adds services in the learning results to the service policy of the Zone, including service names, types,
ports, IP addresses, and associated devices. If services of the same type and port exist on the device
associated with the service policy of the Zone, add learnt IP addresses to existing services.
Choose System > Log Management > System Logs. You can view log information about whether
the automatic confirmation of service learning results succeeds. If the automatic confirmation
succeeds, perform the following operations to view the services confirmed to the service policy.
a. Choose Defense > Policy Settings > Zone.
Click of each service to modify the basic information and configure defense policies of
the service. For parameters of the defense policies, see 3.2.6 Configuring the Zone-based
Defense Policy.
Follow-up Procedure
Prerequisites
The service learning task has been enabled. For details, 3.2.4.2 Configuring a Service Learning Task.
Context
Service learning results contain service names, types, ports, IP addresses, associated devices, and traffic.
During the confirmation of service learning results, the system checks whether services of the same type
and port exist on the associated device in the service policy of the Zone, and performs corresponding
processing.
2. If no such service exists, add services to the policy of the Zone, including service names,
types, ports, IP addresses, and associated devices.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Step 2: Click the Zone's state in the Service Learning column.
Step 3: In the Service Learning Result List group box, select the check box of a service
and click Apply.
----End
Result
1. Choose Defense > Policy Settings > Zone.
3. On the Service tab page, you can view applied service learning results.
Click of each service to modify the basic information and configure defense
policies of the service. For parameters of the defense policies, see 3.2.6
configuring the Zone-based Defense Policy.
Follow-up Procedure
After service learning results are applied to the Zone, configurations take effect only after
deployed on devices. For details, see 3.2.12 deploying the Defense Policy.
3.2.5.1. Description
Dynamic baseline learning provides references for configuring the defense threshold.
The defense policy refers to setting a proper threshold for the traffic volume of a protocol. When the
traffic on the live network exceeds the threshold, the system identifies that an anomaly occurs and
triggers the corresponding attack defense.
Before configuring the defense policy, you may be assailed by two doubts:
The ATIC system supports diversified types of attack defense. You can enable corresponding attack
defense if desired, but not all defense functions. When services on the network are unknown, you can
learn about services on the network by using service learning, and then determine whether to enable
attack defense.
During defense policy configurations, the system prompts you to set defense thresholds for policies.
When the number of the packets of a type destined for the Zone hits the threshold, the system enables
defense against such packets. Because improper configurations may affect normal services, you are
advised to learn the dynamic baseline and set a proper defense threshold according to the learning
result.
1. If the threshold is set to a smaller value, the system enables attack defense even if no attack occurs.
2. If the threshold is set to a larger value, the system cannot enable attack defense in a timely manner.
Therefore, before you configure the threshold, learn about the basic traffic model first.
In dynamic baseline learning, the system learns peak traffic at an interval in the normal network
environment and presents the data in curve to the administrator by using the ATIC.
You are advised to deliver the learning result as the defense threshold, after dynamic baseline learning is
complete. The threshold must be set to a value higher than normal peak traffic.
The dynamic baseline can be learned repeatedly to cope with the changes of network traffic models.
2. Devices associated with the Zone have been bound to collectors. For details, see 2.4.2
associating the Collector with the devices.
Context
Current Threshold indicates the current threshold of a policy; Baseline indicates the traffic
volume learned using baseline learning; Suggestion indicates the recommended threshold
calculated based on the current threshold and baseline. The recommended threshold changes
to the current threshold once being delivered to the device. The recommended threshold is
calculated as follows:
When the defense threshold is configured: recommended threshold = current threshold x
current threshold weight + (baseline value x tolerance value) x (1 - current threshold weight)
When the defense threshold is not configured: recommended threshold = baseline value x
tolerance value
Baseline packet rate < 5000 pps, baseline bandwidth < 20 Mbit/s, or baseline
connection count < 5000: tolerance value = 200%
5000 pps ≤ baseline packet rate < 30,000 pps, 20 Mbit/s ≤ baseline bandwidth < 100
Mbit/s, or 5000 ≤ baseline connection count < 30,000: tolerance value = 180%
30,000 pps ≤ baseline packet rate < 100,000 pps, 100 Mbit/s ≤ baseline bandwidth < 300
Mbit/s, or 30,000 ≤ baseline connection count < 100,000: tolerance value = 160%
100,000 pps ≤ baseline packet rate < 300,000 pps, 300 Mbit/s ≤ baseline bandwidth < 1
Gbit/s, or 100,000 ≤ baseline connection count < 300,000: tolerance value = 140%
300,000 pps ≤ baseline packet rate < 12,000,000 pps, 1 Gbit/s ≤ baseline bandwidth <
10 Gbit/s, or 300,000 ≤ baseline connection count < 12,000,000: tolerance value = 120%
False positive occurs due to the threshold that is too low. Therefore, set the packet rate, bandwidth
value, and connection count to 500 pps, 5 Mbit/s, and 500 respectively, when their recommended
values are smaller than given values.
If only one detecting device is in the same defense group, the baseline learning result of the cleaning
device is the same as that of the detecting device. If multiple detecting devices are available, the
baseline learning result of the cleaning device is the same as the maximum learning result of each
detecting device.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Parameter Description
Learning Cycle After the baseline learning task is started, baseline learning
results are refreshed every five minutes and are applied to
the defense policy only after a learning cycle is completes.
Start Time Indicates the start time of the current cycle for baseline
learning.
Step 4: Click Startup to enable the baseline learning task of the Zone.
If a service is created, the traffic that matches the service is separately learned, and
the traffic that does not match the service are to be learned as a whole. The learning
results are applied to the defense policies of the created service and the default
defense policies. If no service is created, all traffic is learned as a whole and the
learning result is applied to the default defense policy.
To modify the parameters of the learning task, stop baseline learning first.
----End
Result
1. Before the first learning cycle ends, service traffic learning result from the start
time to the current time is displayed. After the first learning period elapses,
service traffic learning result of the last learning cycle is displayed.
After you click in the Operation column, you can view the traffic trend chart
of baseline learning and change the Current Threshold value.
The baseline learning result takes effect only after the corresponding defense item is enabled in
defense policies.
Follow-up Procedure
When the confirmation mode of baseline learning is automatic, service traffic learning result
is automatically applied to the defense policy of the Zone and deployed on devices.
When the automatic confirmation mode is not selected for baseline learning, service traffic
learning result needs to be confirmed manually. For details, see 3.2.5.3 Applying Baseline
Learning Results.
3.2.5.3 Applying Baseline Learning Results
When automatic validation is not adopted by the baseline learning task, you must apply baseline
learning results manually.
Prerequisites
The baseline learning task has been enabled. For details, 3.2.5.2 configuring a Baseline Learning Task.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
Step 3: In the Dynamic Baseline Result group box, select the check box of a service
and click Apply Suggestion to apply the recommended value in baseline learning
results to service policies.
----End
Prerequisites
The defense mode of the Zone has been configured. For details, see 3.2.1 configuring a Defense Mode.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
The name of the default defense policy consists of basic and the IP address of the
associated device. For example, if the IP address of the device is 128.18.60.36, the name
of the default defense policy is basic_128_18_60_36.
----End
Block
-Discards all TCP packets.
Traffic Limiting
− TCP Traffic Limiting: Limits traffic of all TCP packets destined for an IP address
below Threshold.
− TCP Fragment Rate Limiting: Limits traffic of all TCP fragments destined
for an IP address below Threshold.
Defense
Check the flag bits (URG, ACK, PSH, RST, SYN, and FIN) of each TCP packet. If
any flag bit is invalid, the TCP packet is considered abnormal. When the rate
of TCP abnormal packets exceeds the Threshold value, all TCP packets are
discarded.
ACK Threshold If the rate of ACK packets When ACK flood attacks
Flood exceeds Threshold, the are detected, the system
Attack device reports anomaly permits the first packet
Defense events to the ATIC for session establishment
Management center and before session check and
start defense. discards subsequent
packets.
Perform configurations
through baseline
learning. For details,
see 3.2.5.2 Configuring a
Baseline Learning Task.
Source IP Rate Limiting In this mode, rate limiting is Permanent Limiting: In all
TCP- Threshold implemented on the real cases, this function limits
Ratio source IP addresses that the rate of all packets
Anomaly succeed in session check. except the ACK packets
Limiting below Rate Limiting
Threshold.
by destination IP address
destinatio exceeds Threshold, start
n IP defense against
address connection flood
attacks. After the
defense is started, start
checking source IP
addresses.
Block
Traffic Limiting
Limits traffic to defend against attacks when UDP attack packets without
features.
− UDP Traffic Limiting: Limits traffic of all UDP packets destined for an IP
address below Threshold.
− UDP Fragment Rate Limiting Threshold: Limits traffic of all UDP fragments
destined for an IP address below Threshold.
Defense
UDP Flood Threshold When the rate The default value is 50 Mbit/s.
Fingerprin of UDP packets
t Attack reaches the
Defense alert threshold,
UDP fingerprint
learning and
payload check
are enabled,
and the UDP
packets
matching a
specified
fingerprint or
payload are
discarded.
discarded.
Block
Traffic Limiting
Block
-Discards all packets of services except the TCP, UDP, ICMP, DNS, SIP, HTTP, and
HTTPS services.
Traffic Limiting
-Limits the outbound traffic of the services except the TCP, UDP, ICMP, DNS, SIP,
HTTP, and HTTPS services of a destination IP address below Threshold.
Defense
After fingerprint learning is enabled, the packets that match the learned
fingerprint, except those of TCP, UDP, ICMP, DNS, SIP, HTTP, and HTTPS, are
discarded.
Block
Rate Limiting
− Rate Limiting on Request Packets With the DNS requested flood defense
enabled, perform traffic limiting on the source IP address to limit traffic of
DNS request packets below Rate Limiting Threshold. When traffic of DNS
request packets exceeds the threshold, the detecting device reports
anomaly events to the ATIC Management center. Then the cleaning device
discards excess DNS request packets.
− Rate Limiting on Reply Packets With the DNS reply flood defense,
perform traffic limiting on the source IP address to limit traffic of DNS reply
packets below Rate Limiting Threshold. When traffic of DNS reply packets
exceeds the threshold, the detecting device reports anomaly events to the
ATIC Management center. Then the cleaning device discards excess DNS
reply packets.
Defense
DNS Defense Indicates that the cleaning TCP Authentication: Source
Request Mode device defends against DNS authentication is used for
Flood request flood attacks. defense. During source
Parameter Description Value
− DNS Reply Flood Attack Defense
If the rate of DNS reply packets exceeds Threshold, the cleaning device defends against
forged source attacks.
If the proportion of unknown domain name requests within one second exceeds the
threshold, the detecting device reports an anomaly event to the ATIC Management center.
At this time, you are advised to configure an anomaly packet capture task and extract
fingerprints from the packet capture file. The specific unknown domain name can be
extracted and added to the Rate Limiting on Request Packets of Specified Domain
Name list so that traffic rate limiting can be performed on the request packets of the
unknown domain name.
− Packet malformed
After the validity check on packets is enabled, the cleaning device checks DNS packet
formats and discards non-standard packets.
Enable the limiting on the DNS request packet length to limit the length of DNS request
packets below Threshold. When the length of DNS request packets exceeds the threshold,
the detecting device reports anomaly events to the ATIC Management center. Then the
cleaning device discards overlong DNS request packets.
Enable the limiting on the DNS reply packet length to limit the length of DNS reply packets
below Threshold. When the length of DNS reply packets exceeds the threshold, the
detecting device reports anomaly events to the ATIC Management center. Then the
cleaning device discards overlong DNS reply packets.
− Source detection
Block
Traffic Limiting
Defense
− HTTP attack defense
If the defense mode of the Zone is automatic, the system starts defense
automatically. If the defense mode is manual, the administrator needs to
confirm and start the defense manually. For details on how to configure the
defense mode, see 3.2.1 Configuring a Defense Mode.
Within the learning cycle, the number of requests with the same fingerprint
and from the same source IP address exceeds Matching Counts, the source
IP address is regarded as an attack source and is reported to the ATIC
Management center. If the dynamic blacklist mode of the Zone is not Close,
the ATIC Management center automatically adds the IP addresses of attack
sources to the dynamic blacklist. For details on how to configure the
dynamic blacklist mode, see 3.2.1 Configuring a Defense Mode.
The total length of consecutive HTTP post packets exceeds the given value,
but the HTTP payload length is less than the given value.
The headers of consecutive HTTP get/post packets do not have any end
flags.
Parameter Description
Total packet length If either of the following situations occurs, the system is
under HTTP low-rate connection attacks.
Packet number
The total length of consecutive HTTP post packets exceeds
Payload length the given value, but the HTTP payload length is less than
the given value.
The headers of consecutive HTTP get/post packets do not
have any end flags.
Block
Traffic Limiting
Defense
If the defense mode of the Zone is automatic, the system starts defense
automatically. If the defense mode is manual, the administrator needs to
confirm and start the defense manually. For details on how to configure the
defense mode, see 3.2.1 Configuring a Defense Mode.
After defense against anomaly events is enabled, the cleaning device uses the
source authentication mode for defense.
− SSL Defense
3.2.6.9. Top N Study
After the top N study function is configured, you can view learning results, which act
as policy parameters for tracing attack sources and confirming cleaning effects.
Top N study adversely affects device performance. Therefore, enable certain top N
study items listed in Table 3-20.
Top N study results are displayed in reports. For details, see 7 Report.
HTTP HTTP Host Indicates top N host 1. When the Zone is under attack,
learnin fields in the HTTP the learning result can be used
g traffic destined for the for configuring HTTP host
Zone. filtering. For details, see 3.2.2
HTTP URI Indicates top N URI 1 When the Zone is under attack,
fields in the HTTP the learning result can be used
traffic destined for the for configuring URI monitoring.
Zone. For details, see 3.2.6.7 HTTP
Top N HTTP Indicates top N source 1. When the Zone is under attack,
Source IP IP addresses in the you can confirm the cleaning
Addresses HTTP traffic destined effect by comparing top N
(pps/qps) for the Zone. source IP addresses in incoming
HTTPS Top N Indicates top N source 1.When the Zone is under attack,
learning
HTTPS IP addresses in the you can confirm the cleaning
Source IP HTTPS traffic destined effect by comparing top N
Addresses for the Zone. source IP addresses in incoming
(pps) Top N source IP traffic with that in legitimate
Top N DNS Indicates top N source 1. When the Zone is under attack,
Request IP addresses in the you can configure rate limiting over
Source IP DNS request traffic the request packets of the
Addresses destined for the Zone. specified source IP address. For
(pps) Top N source IP details, see 3.2.6.5 DNS Defense
Top N DNS Indicates top N source 1.When the Zone is under attack,
Response IP addresses in the you can configure rate limiting over
Source IP DNS reply traffic the reply packets of the specified
Addresses destined for the Zone. source IP address. For details,
(pps) Top N source IP see 6.2.6.5 DNS Defense Policy.
Limits traffic of service packets destined for an IP address below corresponding thresholds.
Excess packets are directly discarded.
Total indicates that traffic of a single IP address is limited below the threshold.
If the packet rate of a protocol exceeds the threshold, the device reports anomaly events to
the ATIC Management center and start defense.
3.2.6.11 First-Packet Discarding
The anti-DDoS device provides first-packet checks for SYN, TCP, UDP, ICMP, and DNS packets.
Some attack packets frequently change source IP addresses or ports. You can enable first-packet
discarding to block such traffic. You can enable first-packet discarding to work with source
authentication to defend against flood attacks from forged sources.
Protocol Description
Configure first-packet discarding only for the protocols supporting packet retransmission.
Otherwise, normal services will be affected.
This section describes how to configure global defense policies on the ATIC.
Context
This configuration is available only on anti-DDoS devices.
Procedure
Step 1: Choose Defense > Policy Settings > Global Policy.
Step 3: In the Basic Attack Defense group box, select the check box of an attack type
and enable the attack defense function. For parameters, see Table 3-21.
If Large ICMP Packet or Large UDP Packet is selected, the packet length needs to be
specified. The Anti-DDoS discards the ICMP or UDP packet whose length exceeds the
value.
Parameter Description
Fraggle After the Fraggle attack defense is enabled, the Anti-DDoS detects
received UDP packets. If the destination port number of packets is 7 or
19, the Anti-DDoS discards the packets and logs the attack.
ICMP After the ICMP redirection packet attack defense is enabled, the Anti-
Redirection DDoS discards ICMP redirection packets and logs the attack.
Packet
ICMP After the ICMP unreachable packet attack defense is enabled, the Anti-
Unreachable DDoS discards ICMP unreachable packets and logs the attack.
Packet
WinNuke After the WinNuke attack defense is enabled, the Anti-DDoS discards
packets whose destination port is 139, URG tag is set to 1, and URG
pointer is not null, and logs the attack.
In addition, when ICMP fragments are received, the device considers
that a WinNuke attack occurs and hence discards the fragments, and
then logs the attack.
Parameter Description
Land After the Land attack (loopback attack) defense is enabled, the Anti-
DDoS checks whether the source and destination addresses of TCP
packets are the same, or the source address of TCP packets is a loopback
one. If the source and destination addresses are the same, the Anti-
DDoS discards the packets and logs the attack.
Ping of Death After the Ping of Death attack defense is enabled, the Anti-DDoS checks
whether the packet size is larger than 65,535 bytes. If a packet is larger
than 65,535 bytes, the Anti-DDoS discards the packet and logs the
attack.
IP Packet with After the IP packet with route record option attack defense is enabled,
Route Record the Anti-DDoS checks whether the IP route record option is specified in
Option the received packet. If the IP route record option is specified, the device
discards the packet and logs the attack.
Smurf After the Smurf attack defense is enabled, the Anti-DDoS checks
whether the destination IP address of ICMP request packets is the
broadcast address of category A, B, or C. If the destination IP address is
the broadcast address of category A, B, or C, the device discards the
packet and logs the attack.
IP Packet with After the IP packet with source route option attack defense is enabled,
Source Route the Anti-DDoS checks whether the IP source route option is specified in
Option the received packet. If the IP source route option is specified, the device
discards the packet and logs the attack.
NOTE
In the IP routing technology, the transmission path of an IP packet is determined
by the routers on the network according to the destination address of the packet.
Nevertheless, a method is also provided for the packet sender to determine the
packet transmission path, that is, the source route option. This option means
allowing the source site to specify a route to the destination and replace the
routes specified by intermediate routers. The source route option is generally
used for fault diagnosis of network paths and temporary transmission of some
special services. The IP source route option may be utilized by malicious attackers
to probe the network structure because it neglects the intermediate forwarding
processes through various devices along the packet transmission path, regardless
of the working status of forwarding interfaces.
TCP Flag Bit After the TCP flag bit attack defense is enabled, the Anti-DDoS checks
the flag bits (URG, ACK, PSH, RST, SYN, and FIN) of each TCP packet. In
either of the following cases, the device discards the packet and logs the
attack.
All flag bits are set to 1.
All flag bits are set to 0.
Both the SYN bit and the FIN bit are set to 1.
Both the SYN bit and the RST bit are set to 1.
The FIN bit is set to 1 and the ACK bit to 0.
Parameter Description
TearDrop After the TearDrop attack defense is enabled, the Anti-DDoS analyzes
received fragments and checks whether the packet offset is correct. If
the packet offset is incorrect, the device discards the packet and logs the
attack.
Large ICMP After the large ICMP packet attack defense is enabled, the Anti-DDoS
Packet discards the ICMP packet whose length exceeds the threshold and logs
the attack.
IP Packet with After the IP packet with timestamp option attack defense is enabled, the
Timestamp Anti-DDoS checks whether the IP timestamp option is specified in the
Option received packet. If the IP timestamp option is specified, the device
discards the packet and logs the attack.
Tracert After the Tracert packet attack defense is enabled, the anti-DDoS
discards timeout ICMP or UDP packets and destination port unreachable
packets, and logs the attack.
Large UDP After the large UDP packet attack defense is enabled, the Anti-DDoS
Packet discards the UDP packet whose length exceeds the threshold and logs
the attack.
Step 4: Click Confirm.
Step 6: In the Deploy dialog box, display the deployment progress. After the
deployment is complete, the dialog box is closed automatically.
Move the pointer to Deploy Failed to view details on the failure in deploying the
basic attack defense on the device.
----End
Follow-up Procedure
Choose Defense > Policy Settings > Global Policy, select the check box of the device and
This section describes how to configure the blacklist and whitelist functions in the ATIC
management center.
Procedure
Step 5: Click Close.
DoS.
----End
If the IP location division granularities in the IP location database file cannot meet requirements, you can
create user-defined IP locations.
Procedure
Step 1: Choose Defense > Public Settings > IP Location User-Defined.
Step 2: Click .
Parameter Description
Step 4: Click OK.
----End
3.2.9. Library Files
This section describes how to load and update the botnet, Trojan horse, and worm library file, malicious
URL library file, IP reputation library file, and IP location library file.
1. Choose Defense > Network Settings > Devices
The SFTP user name and password must be pre-set on the device and the same as
those configured on the ATIC management center.
SFTP is more secure than FTP. To secure data transmission, use SFTP to transfer files.
Management Operations
Choose Defense > Public Settings > Library File. Manage IP address descriptions.
Deploy Click to deploy the selected library file to the device.
Import 1. Click .
2. In the Import window, click Browse..., select the library file, and
click OK.
The botnet, Trojan horse, and worm library file name must be in
the IPS_H*.zip format. The IP location library file name must be in
the location_sdb*.zip format. The IP reputation library file name must
be in the IPRPU_H*.zip format. And the malicious URL library file must
be in the CNC_H*.zip format.
Imported library files are displayed in the library file list.
Export
1. Select a library file and click .
2. In the displayed File Download window, click Save to save the file
locally or click Open to view the file.
Delete 1. Delete one IP address description:
Click in the Operation column on the right of an IP address
description to delete the description.
2. Delete IP address descriptions in batches:
Select the check boxes of multiple IP address descriptions and
click above the list to delete the selected IP address
descriptions.
Select the check box on the title bar and click above the
list to delete all IP address descriptions.
NOTE
Only Undeployed library files can be directly deleted. If a library file has been
successfully or partially deployed, it cannot be deleted. To delete a deployed library
file, load another library file of the same type. The newly loaded library file overwrites
the deployed one and is in Undeployed state. Then, you can delete this file.
Synchroniz
e Click .
Download the latest library file from the secure cloud center to the ATIC
management center.
Ensure that the secure cloud center and ATIC management center are
reachable.
NOTE
The ATIC management center supports automatic database file synchronization and
automatically updates the database file in 4 a.m. every day. After the update is
complete, both the new and old database files exist in the database file list. The ATIC
supports a maximum of 40 database files. If there are more than 40 database files,
the synchronization fails. You need to manually delete old database files.
3.2.10. Configuring Policy Templates
A policy template defines the defense policies of various types for an device model to facilitate policy
configurations.
The ATIC Management center provides 4 common policy templates. Among them, Web defense
templates (WEB Server), DNS cache defense templates, (DNS Caching Server), DNS authorization
defense templates, (DNS Authoritative Server), and basic defense templates, (General Server). You can
use any of them as required.
Templates for Web defense protect the Web server. You are advised to use templates of this
type if HTTP or HTTPS servers are deployed on the live network.
Templates for DNS cache defense protect the DNS cache server. You are advised to use
templates of this type if DNS cache servers are deployed on the live network.
Templates for DNS authorization defense protect the DNS authorization server. You are advised
to use templates of this type if DNS authorization servers are deployed on the live network.
Templates for basic defense protect TCP, UDP, and ICMP services on the network. You are
advised to templates of this type if no DNS or Web server is deployed on the live network .
Create
Click to create a policy template manually. For details,
see Creating a Policy Template.
NOTE
You can save policy configurations as a template.
Modify
Click in the Operation column and then the Basic Information page
in the Modify Policy Template dialog box to change the template name
and modify remarks. Click the tab of each defense policy to modify the
defense policy. For parameters, see 3.2.6 Configuring the Zone-based
Defense Policy.
Associate a Click to associate the policy template with the Zone. For details,
Zone see Associating a Zone.
Delete
Select the check box of a policy template and click .
Action Description
Query Enter part of a template name or the template name in Template name
template
and click .
2. Click .
If a protocol type is specified, the created policy template applies to service policies;
if not, the created policy template applies to Zone-based policies.
4. Click the tab of each defense policy and configure the defense policy. For
parameters, see 3.2.6 Configuring the Zone-based Defense Policy.
5. Click OK.
Associating a Zone
Two methods are available for configuring the policy for the Zone with the policy
template:
3.2.11. Cloud Cleaning
Cloud cleaning ensures the availability of the entire network by connecting to the cloud cleaning
service provider for upstream traffic cleaning based on alarm policy settings in case of network
faults caused by massive attack traffic.
Before you configure cloud cleaning, ensure that you have contracted the service from the cloud
cleaning service provider.
Access key CTCC: Set the public key that the cloud
service provider provides for users.
HW: Set the user name that the cloud
service provider provides for users.
3. Click OK.
You can also manually implement the cloud cleaning policy by selecting the
check box of the cloud cleaning policy in Cloud Clean Policy List and
1. You can click in Cloud Clean Policy List to manually add static cloud
cleaning policies.
Parameter Description
Automatic unlock time Set the aging time of the cloud cleaning
service.
2. Click OK.
Prerequisites
The basic policies of the Zone have been configured. For details, see 3.2.1 Configuring a Defense
Mode.
Context
The SIG does not support policy deployment. By synchronizing data from the ATIC Management
center periodically, the SIG automatically obtains the configuration data.
Procedure
Step 1: Choose Defense > Policy Settings > Zone.
----End
3.2.13 Saving Configurations
After a policy is configured, you can save configurations through the CLI or ATIC Management center.
Saving Configurations through the CLI
Step 1 Run the save [ cfg-filename ] command in the user view to save current
configurations.
If cfg-filename is not specified, the current configuration file directly overwrites the
default startup one.
----End
Step 3: In the OK dialog box, click OK. The saving progress is displayed. After the saving
is complete, the dialog box is automatically closed.
----End
When the detecting device is in off-line mode, to detect traffic, you need to configure optical
splitting or mirroring to copy traffic to the detecting device.
Mirroring, packets received or sent by a port (mirroring port) are copied to a specified port
(observing port) and then are issued to the detecting device. By analyzing packets captured by
the detecting device, you can learn data transmitted over the mirroring port.
As shown in Figure 4-1, the detecting device is directly connected to GE1/0/1 on Router1, which
uses interfaces as mirroring and observing ports. Inbound traffic of GE1/0/0 is copied to GE1/0/1
through the port mirroring, and then is issued to the detecting device for analysis.
Mirroring and traffic-diversion routers can be the same router or different ones.
Figure 4-1 Mirroring
This mode applies to enterprise networks because of low costs and no extra device or
component; however, this mode requires CLI configurations on the router.
To enable traffic copying in mirroring mode, only configure CLIs related to port
mirroring on the router. The following uses Huawei NE80E as an example for
describing how to configure port mirroring on the router.
This interface serves as the local observing port. Such interfaces involve the GE
interface and its subinterfaces, the Eth-Trunk interface and its subinterfaces, the
POS interface, and the IP-Trunk interface, for example, Router1 GE1/0/1 shown
in Figure 4-1.
When the physical port serves as the observing port, the index number of the
observing port must be identical with the slot number of the LPU where the
interface resides. When the logical interface serves as the observing port, the
index number cannot be used by another observing port.
Step 2: Configure the observing port for the mirroring of the entire LPU.
After the command is configured, the observing port of the index serves as that
for the mirroring of the entire LPU. When mirroring is enabled on an interface of
the LPU, packets are mirrored to this observing port. Such an observing port can
be configured on either the local LPU or another LPU.
This interface serves as the local mirroring port. Such interfaces involve the GE
interface and its subinterfaces, the POS interface, FR interface, serial interface,
and MP-Group interface, for example, Router1 GE1/0/0 shown in Figure 7-1.
----End
4.2. Configuring Traffic Diversion
When the cleaning device is in off-line mode, you can configure traffic diversion to divert the traffic
destined for the given IP address to the cleaning device for defense or traffic analysis.
A policy-based route is configured on the router to divert the traffic meeting conditions to the cleaning
device. The policy-based route needs to be configured only on the traffic-diversion router, not on the
cleaning device.
Implementation Mechanism
A policy-based route is generally applicable to static traffic-diversion. As shown in Figure 4-2, a traffic-
diversion channel is established between GE1/0/1 on Router1 and GE2/0/1 (cleaning interface) on the
cleaning device. Apply a policy-based route to inbound interface GE1/0/0 on Router1. In this way, the
packets meeting conditions are forwarded to the cleaning device through GE1/0/1, instead of the
routing table. Therefore, traffic destined for the Zone is forcibly diverted.
As shown in Figure 4-2, configure a policy-based route for inbound traffic GE1/0/0 on
Router1.
2. Configure the ACL to define the data flow matching the policy-based route.
A value ranging from 2000 to 3999 indicates a basic or an advanced ACL.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
For IPv6 packets, the value ranges from 2000 to 3999.
A value ranging from 2000 to 2999 indicates a basic ACL.
A value ranging from 3000 to 3999 indicates an advanced ACL.
acl-name specifies the name of a naming ACL. The value is a string of 1 to
32 case-sensitive characters and cannot contain a space. It must start with a
letter from a to z or A to Z, and can be a combination of letters, digits,
hyphens (-), or underscores (_).
4. Run the following commands to define a traffic behavior and set an action
accordingly.
a. Run the traffic behavior behavior-name command in the system view to
define a traffic behavior and access the traffic behavior view.
behavior-name: specifies the name of a traffic behavior. The value is a string
of 1 to 31 characters.
b. Run the redirect ip-nexthop ip-address [ interface interface-type
interface-number ] command to redirect to the next hop.
ip-address specifies the IP address of the redirected next hop.
interface-type interface-number specifies the type and number of the
outbound interface. The number is in the slot number/card number/port
number format.
5. Run the following commands to define a traffic policy and specify a behavior
for the classifier in the policy.
a. Run the traffic policy policy-name command in the system view to define
a traffic policy and access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1
to 31 characters.
b. Run the classifier classifier-name behavior behavior-
name [ precedence precedence ] command to specify a behavior for the
traffic classifier in the policy.
classifier-name specifies the name of a traffic classifier. It must be already
defined.
behavior-name specifies the name of a traffic behavior. It must be already
defined.
precedence indicates the priority of the associated traffic classifier and
behavior. The value is an integer ranging from 1 to 255. The smaller
the precedence value, the higher the priority. The associated traffic classifier
and behavior are preferentially processed. If precedence is not specified,
the system searches for associations by configuration sequence.
6. Run the following commands to apply the policy-based route to the interface.
a. Run the interface interface-type interface-number commands in the
system view to access the interface view.
b. Run the traffic policy policy-name inbound command to apply the policy-
based route.
inbound applies the traffic policy to the inbound direction.
Implementation Mechanism
As shown in Figure 4-3, a traffic-diversion channel is established between GE1/0/1 on
Router1 and GE2/0/1 of the cleaning device, on which GE2/0/1 serves as the cleaning
interface and GE2/0/2 as the traffic-injection interface. After a traffic-diversion task is
configured, a 32-bit static host route is generated on the cleaning device. In this case,
configure BGP on both the cleaning device and the Router1 to import the UNR route
to BGP. Then BGP advertises the UNR route to Router1.
The following uses automatic traffic diversion and Zone 1.1.1.1/32 as an example for
illustrating the implementation mechanism of BGP traffic diversion:
1. When the traffic destined for Zone 1.1.1.1/32 becomes abnormal, the ATIC
Management center automatically delivers a traffic-diversion task to the
cleaning device. Subsequently, a 32-bit static host route is generated on the
cleaning device. The destination IP address of the UNR route is 1.1.1.1/32 and
the next hop is GE1/0/2 on Router1 directly connected to the traffic-diversion
interface on the cleaning device.
2. A BGP peer is established between GE2/0/1 on the cleaning device and
GE1/0/1 on Router1. The cleaning device advertises the generated UNR route to
Router1 through BGP.
4. After receiving packets destined for 1.1.1.1/32, Router1 searches the routing
table to send packets to the GE2/0/1 interface on the cleaning device by using
its GE1/0/1 according to the longest mask match to implement traffic diversion.
In the previous mechanism, the 32-bit static host route on the cleaning device takes
effect only if configured through the CLI and ATIC Management center. Perform the
following:
2. On the ATIC Management center GUI, select a traffic-diversion mode for the
Zone to dynamically generate a traffic-diversion task. For details, see 3.2.1
Configuring a Defense Mode. Alternatively, create a static traffic-diversion task.
For details, see 4.2.3 Configuring BGP Traffic Diversion (ATIC).
After the generated traffic-diversion task is delivered to the cleaning device, the
system displays the corresponding command, that is, firewall ddos traffic-
diversion [ vpn-instance vpn-instance-name ] ip ip-address [ mask | mask-
length ] [ ip-link name ] or firewall ddos traffic-diversion [ vpn6-instance vpn6-
instance-name ] ipv6 ipv6-address [ mask-length ].
After previous two steps are complete, a UNR route is generated on the cleaning
device. For example, the automatic traffic-diversion mode is configured for Zone
1.1.1.1/32 in the ATIC Management center and the firewall ddos bgp-next-hop
2.2.2.2 command is configured on the cleaning device. When the detecting device
detects abnormal upon 1.1.1.1/32, a UNR route with destination IP address
1.1.1.1/32 and next hop 2.2.2.2 is generated on the cleaning device.
The generated UNR route delivers the traffic injection function. With this UNR route,
the cleaned traffic is injected to GE1/0/2 on Router1. To avoid loops, that is, the
cleaned traffic is sent to the cleaning device through Router1, configure a policy-
based route on GE1/0/2. With the policy-based route, traffic is sent to downstream
Router2 and then the Zone.
In certain scenarios such as multiple traffic-diversion links, you need to filter the UNR
route generated by the cleaning device to prevent the route from being delivered to
the FIB and interfering with injected traffic. Meanwhile, configure other traffic-
injection policy to inject the traffic to the original link.
Run the following command on the cleaning device to filter the UNR route:
1. When static traffic injection is adopted, and the cleaning device forwards traffic to
the access router based on the generated UNR route, do not configure the
command.
2. When static route traffic injection is adopted, to prevent the generated UNR route
from affecting static route forwarding, configure the command.
3. When GRE traffic injection is adopted, to prevent the generated UNR route from
affecting GRE forwarding, configure the command.
4.When MPLS LSP traffic injection is adopted, to prevent the generated UNR route
from affecting MPLS forwarding, configure the command.
5. When MPLS VPN traffic injection is adopted, to prevent the generated UNR route
from affecting MPLS forwarding, configure the command.
6. When multiple traffic-injection links exist and the cleaning device learns the route
to the Zone through routing protocols such as OSPF, to prevent the generated
UNR route from affecting OSPF forwarding, configure the command.
The cleaning device can be configured with only one next-hop address. If this
command is configured for multiple times, the new IP address will overwrite the
existing one.
After this command is configured, the dynamically generated UNR route cannot
be delivered to the FIB.
4. (Optional) Run the following commands to configure the BGP group attribute.
Configure the BGP group attribute according to the networking. In normal cases,
to avoid loops, you are advised to configure the filtering policy.
a. Run the route-policy route-policy-
name { permit | deny } node node command in the system view to create a
routing policy and access the policy view.
f. Run the peer { ipv4-address | group-name } advertise-
community command to advertise the standard group attribute to the peer
or peer group.
g. Run the peer { ipv4-address | group-name } route-policy route-policy-
name export command to configure a routing policy in the outbound
direction.
When the MPLS VPN traffic-injection mode is adopted and the cleaning
device serves as a PE, you need to bind a VPN instance to the traffic-
diversion interface. In BGP traffic-diversion mode, configure the BGP peer in
the BGP-VPN instance view.
Task Example
As shown in Figure 4-4, the detecting device and cleaning device are deployed on the
network in off-line mode to detect and clean the traffic destined for the Zone. BGP
traffic diversion is configured on the cleaning device. When identifying anomalies, the
detecting device reports exception logs to the ATIC management center, who then
automatically delivers a traffic-diversion policy to the cleaning device to divert all
traffic to the cleaning device. Consequently, the cleaning device cleans diverted
traffic and injects normal traffic to the original link.
Assume that a Zone is at 2.2.2.0/24. When the traffic destined for 2.2.2.2/32 is abnormal,
perform the following to automatically divert such traffic to the cleaning device for
cleaning:
1. On the cleaning device, configure the next-hop address for dynamically
generating a route.
<sysname> system-view
[sysname] firewall ddos bgp-next-hop 7.7.2.2
4. When the traffic destined for Zone 2.2.2.2/32 becomes abnormal, the ATIC
management center automatically delivers a traffic-diversion task to the
cleaning device. Then the cleaning device generates a UNR route with next hop
7.7.2.2 to 2.2.2.2 and delivers the route to the FIB. Cleaned traffic is forwarded
to GE1/0/2 on Router1 after matching the entry.
When you employ the MPLS or GRE traffic-diversion mode, run the firewall ddos
bgp-next-hop fib-filter command to disable the generated UNR route from
being delivered to the FIB, ensuring in-service MPLS or GRE forwarding.
Traffic diversion tasks can be divided into static traffic diversion tasks, manual traffic diversion tasks, and
automatic traffic diversion tasks. The static traffic diversion task needs to be created by the
administrator, and the manual and automatic traffic diversion tasks are dynamically generated by the
system.
After the traffic diversion task is delivered to the cleaning device, the firewall
ddos traffic-diversion [ vpn-instance vpn-instance-name ] ip ip-
address [ mask | mask-length ] command is generated on the cleaning device.
This command works with other commands to realize BGP traffic diversion.
After the anomaly or attack ends, the diversion persists for a while before it is
automatically canceled to ensure that the anomaly or attack traffic is
thoroughly cleaned. For how to set the persistence time for traffic diversion,
see 7.2.4 Maintaining Anti-DDoS Data.
Management Operation
Choose Defense > Policy Settings > Traffic Diversion, manage traffic diversion tasks.
Create
Click to create a static traffic diversion task in the ATIC
Management center. For details, see Creating a Static Traffic Diversion Task.
Delete Select the check box of the traffic diversion task to be deleted and
click to delete the task.
Enable The traffic diversion task in the enabled state is delivered to the cleaning
device. Only the traffic diversion task delivered to the cleaning device takes
effect. Perform the following operations:
Select the check box of the traffic diversion task to be enabled and
click .
Disable The traffic diversion task in the disabled state does not take effect. Perform
the following operations:
Select the check box of the traffic diversion task to be disabled and
click .
You can Choose Defense > Policy Settings > Zone and click the corresponding diversion state of the
Zone in the Diversion State column to manage the diversion tasks of the Zone on the Traffic
Diversion Task List tab page
Step 5: Configure the IP address for traffic diversion. After a static traffic diversion task
is delivered, all traffic destined for the IP address is diverted to the cleaning device
for cleaning.
If the IP address for traffic diversion is in a user-defined Zone but you do not know
the actual IP address or IP address segment, select Select IP Address in Input
Mode. Then select the IPv4 address or IPv6 address for traffic diversion.
d. Click OK.
e. On the Create Traffic Diversion Task page, select subnet IP addresses
after splitting.
If the IP address for traffic diversion is in a default Zone or you know the actual IP
address or IP address segment in a user-defined Zone, select Enter IP
Address in Input Mode. Then enter the actual IP address and subnet mask.
4.3.1 Layer-2 Injection
In Layer-2 injection, the cleaning device injects the cleaned traffic to the Zone in Layer 2 mode instead of
routing forwarding.
Implementation Mechanism
As shown in Figure 4-5, the E1/1 interface on the core switch is directly connected to
interface GE1/0/1 on the cleaning device. The channel between them is for both traffic
diversion and traffic injection. Two VLANs such as VLAN1 and VLAN2 are created on the
switch. Two subinterfaces on the cleaning device are associated with VLAN1 and VLAN2 for
traffic diversion and injection respectively. Traffic is diverted to the cleaning device for
cleaning over VLAN1 of the core switch. After cleaning is complete, the cleaning device
requests the MAC address of the Zone by sending an ARP request packet. Then the Zone
replies with an ARP reply packet. Subsequently, the cleaning device injects traffic to the
Zone based on the MAC address over layer 2.
Layer 2 injection is applicable to the scenario where only the Layer 2 forwarding device exists between
the core switch and the Zone.
Configuring the Cleaning Device
The VLAN function is configured on the cleaning device to forward injected traffic through the
VLAN.
By default, a sub-interface is not encapsulated with 802.1Q and is not associated with any
VLAN.
In Layer-2 injection, if subinterfaces are used for traffic injection, anti-DDoS policies are
configured on subinterfaces. If VLANIF interfaces are used for traffic injection, anti-DDoS
policies are configured on corresponding physical interfaces.
In static route injection, cleaned traffic is injected from the cleaning device to the router along
the static route, and is finally to the Zone.
Implementation Mechanism
In practice, the traffic-injection router can be either Router1 or another downstream router (such as
Router2).
Router1 learns the UNR route advertised by the cleaning device and uses the cleaning device as
the next hop of the route to the Zone. In this way, after cleaned traffic is injected to Router1,
Router1 forwards the traffic to the cleaning device according to the routing table. This arises a
loop. To avoid such a loop, configure a policy-based route on inbound interface GE1/0/2 of
Router1 to send injected traffic to downstream Router2 for forwarding.
As the simplest traffic injection mode, static route injection is generally applicable to the
scenario where only one traffic-injection link exists.
ip-address specifies the destination IP address of a static route, that is, the Zone whose traffic is to be
diverted.
preference specifies the priority of a static routing protocol. The value ranges from 1 to 255, with 60 as
the default value.
nexthop-address specifies the next-hop address of a static route, that is, Router1 GE1/0/2 directly
connected to the traffic-injection interface on the cleaning device.
2. Configure the ACL to define the data flow matching the policy-based route.
1. A value ranging from 2000 to 3999 indicates a basic or an advanced ACL.
2. A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2
Ethernet frame header.
4. Run the following commands to define a traffic behavior and set an action accordingly.
b. Run the classifier classifier-name behavior behavior-
name [ precedence precedence ] command to specify a behavior for the traffic
classifier in the policy.
6. Run the following commands to apply the policy-based route to the interface.
In UNR route injection, cleaned traffic is injected from the cleaning device to the router along the UNR
route, and is finally to the Zone.
Implementation Mechanism
This function is configured on the Anti-DDoS.
In practice, the traffic-injection router can be either Router1 or another downstream router (such as
Router2).
In BGP traffic diversion, Router1 learns the UNR route advertised by the cleaning device and uses the
cleaning device as the next hop of the route to the Zone. In this way, after cleaned traffic is injected to
Router1, Router1 forwards the traffic to the cleaning device according to the routing table. This arises a
loop. To avoid such a loop, configure a policy-based route on inbound interface GE1/0/2 of Router1 to
send injected traffic to downstream Router2 for forwarding.
When BGP traffic diversion is employed, you need to only specify an IP address for the Zone whose
traffic is to be diverted on the ATIC Management center. Then the setting is delivered to the cleaning
device. In this way, a UNR route is automatically generated on the cleaning device. For details on the
implementation mechanism, see47.2.2 Configuring BGP Traffic Diversion (CLI). 4.2.3 Configuring BGP
Traffic Diversion (ATIC) shows the configuration procedure.
2. Configure the ACL to define the data flow matching the policy-based route.
A value ranging from 2000 to 3999 indicates a basic or an advanced ACL.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2 Ethernet frame
header.
4. Run the following commands to define a traffic behavior and set an action accordingly.
interface-type interface-number specifies the type and number of the outbound interface. The
number is in the slot number/card number/port number format.
5. Run the following commands to define a traffic policy and specify a behavior for the classifier in
the policy.
a. Run the traffic policy policy-name command in the system view to define a traffic policy and
access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31 characters.
b. Run the classifier classifier-name behavior behavior-name [ precedence precedence ]
command to specify a behavior for the traffic classifier in the policy.
precedence indicates the priority of the associated traffic classifier and behavior. The value is
an integer ranging from 1 to 255. The smaller the precedence value, the higher the priority. The
associated traffic classifier and behavior are preferentially processed. If precedence is not
specified, the system searches for associations by configuration sequence.
6. Run the following commands to apply the policy-based route to the interface.
In policy-based route injection, a policy-based route is configured respectively on the cleaning device
and router, so that cleaned traffic is injected to the Zone along different links.
Implementation Mechanism
This function is configured on the Anti-DDoS.
In BGP traffic diversion, Router1 learns the UNR route advertised by the cleaning device and uses the
cleaning device as the next hop of the route to the Zone. In this way, after cleaned traffic is injected
to Router1, Router1 forwards the traffic to the cleaning device according to the routing table. This
arises a loop. To avoid such a loop, configure a policy-based route on inbound interface GE1/0/2 of
Router1 to send injected traffic to downstream Router2 or Router3 for forwarding.
Assume that the traffic is diverted to the cleaning device through BGP. The procedure is as follows:
a. Apply the policy-based route to inbound interface GE2/0/1 on the cleaning device to inject
the traffic of different Zones to Router1 GE1/0/2 and GE1/0/3 respectively.
b. Apply the policy-based route to inbound interfaces GE1/0/2 and GE1/0/3 on Router1 to
inject traffic to downstream Router2 or Router3, and finally to the Zone1 or Zone2.
In policy-based route diversion, no loop exists between Router1 and the cleaning device. Therefore,
you need to only apply the policy-based route to the cleaning device.
Assume that the traffic is diverted to the cleaning device through the policy-based route. The
procedure is as follows:
a. Apply the policy-based route to inbound interface GE2/0/1 on the cleaning device to inject
the traffic of different Zones to different interfaces on Router1.
b. The injected traffic is sent to Router2 or Router3 according to the routing table after
reaching Router1. Subsequently, the traffic is issued to the Zone.
In practice, the traffic-injection router can be either Router1 or another downstream router (such as
Router2).
2. In the system view, create a PBR policy and access its view.
policy-based-route
3. Create a PBR rule and access its view.
rule name rule-name
4. Set the matching conditions of the PBR rule. Either the source security zone or incoming interface
must be specified as the matching condition. If you specify both, the latest configuration overwrites
the previous configuration. The source IP address, destination IP address, service type, application
type, and user are optional. You can select them as required.
| ipv6-address ipv6-prefix-
length | range { ipv4-start-address ipv4-
end-address | ipv6-start-address ipv6-
end-address } | mac-address&<1-6>
| isp isp-name | domain-setdomain-set-
name &<1-6> | any }
NO PBR applies to certain scenarios. For example, to implement PBR on subnet 10.1.1.0/24 except
10.1.1.2, configure a rule with a higher priority to implement NO PBR on 10.1.1.2 first and then
another rule with a lower priority to implement PBR on subnet 10.1.1.0/24.
6. Optional: Enable PBR to interwork with IP-link or BFD and enable the Anti-DDoS to determine the
validity of PBR based on IP-link or BFD status.
track { ip-link link-id | bfd-session bfd-session-id }
Before you enable PBR to interwork with BFD, create BFD sessions.
If IP-link or BFD is configured and detects that the next hop is unreachable, the Anti-DDoS forwards
the packet based on the route table.
2. Configure the ACL to define the data flow matching the policy-based route.
A value ranging from 2000 to 3999 indicates a basic or an advanced ACL.
A value ranging from 4000 to 4099 indicates an ACL based on the Layer-2 Ethernet frame
header.
4. Run the following commands to define a traffic behavior and set an action accordingly.
5. Run the following commands to define a traffic policy and specify a behavior for the classifier in
the policy.
a. Run the traffic policy policy-name command in the system view to define a traffic policy and
access the policy view.
policy-name: specifies the name of a traffic policy. The value is a string of 1 to 31 characters.
b. Run the classifier classifier-name behavior behavior-name [ precedence precedence ]
command to specify a behavior for the traffic classifier in the policy.
precedence indicates the priority of the associated traffic classifier and behavior. The value is
an integer ranging from 1 to 255. The smaller the precedence value, the higher the priority. The
associated traffic classifier and behavior are preferentially processed. If precedence is not
specified, the system searches for the association according to the configured sequence.
6. Run the following commands to apply the policy-based route to the interface.
In GRE traffic injection, a tunnel is established between the cleaning device and the traffic-injection
router to directly issue the traffic to the router and finally to the Zone.
Implementation Mechanism
This function is configured on the Anti-DDoS.
As shown in Figure 4-9, Router1 is a traffic-diversion router. A traffic-diversion channel is established
between GE1/0/1 on Router1 and GE2/0/1 on the cleaning device. Inbound traffic is diverted to GE2/0/1
through Router1 GE1/0/1 for cleaning.
Router2 is a traffic-injection router. A GRE tunnel is established between the cleaning device and
Router2. Tunnel interfaces are created on them respectively, and the source and destination IP
addresses of tunnel interfaces are specified. The source IP address of the tunnel interface is the IP
address of the actual interface for sending packets, and the destination IP address is the IP address of
the actual interface for receiving packets. Cleaned traffic is forwarded to Router2 over the GRE tunnel
and is finally to the Zone.
In practice, the traffic-injection router can be either Router2 or another downstream router.
In the BGP traffic-diversion scenario, GRE traffic injection directly issues injected traffic to the
downstream router that cannot learn the traffic-diversion route, avoiding loops.
Because GRE traffic injection demands the router to be equipped with GRE and basic route forwarding
functions, it is applicable to the scenario where few traffic-injection routers are available. In the scenario
where multiple GRE tunnels need to be established between the cleaning device and traffic-injection
routers, you are advised to configure dynamic route injection, because configuring static routes are
complex.
1. Traffic injection is applied unidirectionally to post-cleaning traffic. Therefore, it does not support
the TCP proxy.
2. When you configure GRE injection, do not configure the keepalive command at both ends of the
tunnel.
3. Run the tunnel-protocol gre command to set the encapsulation mode of the tunnel interface to
GRE.
The value can be the name or IP address of an interface. If the interface name is employed, the
value can be GigabitEthernet, POS, Eth-Trunk, or IP-Trunk.
If the interface IP address is specified, it can be either the IP address of the traffic-injection interface
or the loopback address of the cleaning device.
The destination IP address of the tunnel interface must be different from its source IP address.
The IP address of the tunnel interface can be specified as any IP address. When the route that
marks packets forwarded by the tunnel interface is generated through the dynamic routing
protocol, the IP addresses of the interfaces at both ends of the GRE tunnel must reside on the same
network segment.
The tunnel interface can be added to any security zone. When the tunnel interface and the
interface to which the source IP address belongs are not in the same security zone, configure
interzone packet filtering to enable communication between two security zones.
policy-based-route
rule name rule-name
ingress-interface { interface-type interface-number }
destination-address { ipv4-address [ ipv4-mask-length | mask mask-address ] | ipv6-address ipv6-
prefix-length }
action pbr egress-interface interface-type interface-number
Configure PBR on the cleaning device and sent the diversion traffic to the tunnel interface for
forwarding. In this way, cleaned traffic can enter the GRE tunnel and be forwarded to the correct
GRE tunnel destination.
The destination IP address of the tunnel interface must be different from its source IP address.
The specified destination IP address can be the IP address or loopback address of the traffic-
injection interface on the cleaning device.
The IP address of the tunnel interface can be specified as any IP address. When the route that
marks packets forwarded by the tunnel interface is generated through the dynamic routing
protocol, the IP addresses of the interfaces at both ends of the GRE tunnel must reside on the same
network segment.
In Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) traffic injection, MPLS LSP is
established between the cleaning device and the traffic-injection router. Thereby, cleaned traffic is
tagged with single-layer labels and is finally forwarded to the Zone.
Implementation Mechanism
This function is configured on the Anti-DDoS.
MPLS and LDP are configured respectively on the cleaning device, Router1, and Router2, MPLS labels are
tagged, and MPLS LSP is established. In this regard, cleaned traffic is tagged with single-layer labels on
the cleaning device, and is injected to the original link based on the pre-defined LSP. This avoids the
traffic-diversion route advertised by the cleaning device.
In practice, the traffic-injection router can be either Router2 or another downstream router.
In the BGP traffic-diversion scenario, MPLS LSP traffic injection can evade the traffic-diversion route to
directly issue injected traffic to the downstream router that cannot learn the traffic-diversion route,
avoiding loops.
As typical dynamic traffic injection, MPLS LSP traffic injection delivers flexible applications and sound
scalability, but demands MPLS supported by routers .
Configuring Router1
The following uses Huawei NE80E as an example for describing how to configure Router1 in MPLS LSP
traffic injection.
Step 1 Set the IP address of the Router1 interface and loopback address serving as
the LSR ID. Use OSPF to notify the network segment connected to each interface and
the host route of the LSR ID.
Step 2 Configure basic MPLS functions.
1. Run the system-view command in the user view to access the system view.
2. Run the mpls lsr-id lsr-id command to set an LSR ID.
lsr-id specifies an LSR ID, in dotted decimal notation. It is used for identifying an
LSR.
Setting the LSR ID is the premise of configuring other MPLS commands.
No default LSR ID is available. You are advised to use the IP address of the
loopback interface of the LSR as the LSR ID.
To modify the specified LSR ID, run the undo mpls command in the system view
to delete all MPLS configurations.
3. Run the mpls command to enable global MPLS and access the MPLS view.
4. Run the quit command to return to the system view.
5. Run the mpls ldp command to enable global LDP and access the MPLS-LDP
view.
6. Run the quit command to return to the system view.
7. Run the interface interface-type { interface-number | interface-
number.subinterface-number } command to access the interface view.
Interfaces indicate inbound interface GE1/0/2 and outbound interface GE1/0/3.
8. Run the mpls command to enable interface-based MPLS.
9. Run the mpls ldp command to enable interface-based LDP.
10. Run the quit command to return to the system view.
----End
Configuring Router2
The following uses Huawei NE80E as an example for describing how to configure
Router2 in MPLS LSP traffic injection.
Step 1 Set the IP address of the Router2 interface and loopback address serving as
the LSR ID. Use OSPF to notify the network segment connected to each interface and
the host route of the LSR ID.
No default LSR ID is available. You are advised to use the IP address of the
loopback interface of the LSR as the LSR ID.
To modify the specified LSR ID, run the undo mpls command in the system view
to delete all MPLS configurations.
3. Run the mpls command to enable global MPLS and access the MPLS view.
4. Run the quit command to return to the system view.
5. Run the mpls ldp command to enable global LDP and access the MPLS-LDP
view.
7. Run the interface interface-type { interface-number | interface-
number.subinterface-number } command to access the interface view.
----End
In MPLS VPN traffic injection, a Layer-3 MPLS VPN is established between the cleaning device and the
traffic-injection router. Thereby, cleaned traffic is injected to the original link and is finally sent to the
Zone.
Implementation Mechanism
This function is configured on the Anti-DDoS.
A Layer-3 MPLS VPN is established between the cleaning device and Router2. The cleaning device acts as
an ingress Provider Edge (PE) device, Router1 as a P device, and Router2 as an egress PE device. Cleaned
traffic is injected through GE2/0/2 to GE1/0/1 on Router2 along the dynamically established Label
Switched Path (LSP). Cleaned traffic is tagged with two layers of labels and outer labels are stripped after
the traffic passes through Router1. Then Router2 searches the corresponding private routing table
based on inner private labels to forward the traffic to the Zone.
In practice, the traffic-injection router can be either Router2 or another downstream router.
In the BGP traffic-diversion scenario, MPLS VPN traffic injection directly issues injected traffic to the
downstream router that cannot learn the traffic-diversion route, avoiding loops.
As typical dynamic traffic injection, MPLS VPN traffic injection delivers flexible applications and sound
scalability, but demands MPLS supported by routers.
Configuring Router1
The following uses Huawei NE80E as an example for describing how to configure
Router1 in MPLS VPN traffic injection.
Step 1 Set the IP address of the Router1 interface and loopback address serving as
the LSR ID. Use OSPF to notify the network segment connected to each interface and
the host route of the LSR ID.
Step 2 Configure basic MPLS functions.
1. Run the system-view command in the user view to access the system view.
2. Run the mpls lsr-id lsr-id command to set an LSR ID.
lsr-id specifies an LSR ID, in dotted decimal notation. It is used for identifying an
LSR.
Setting the LSR ID is the premise of configuring other MPLS commands.
No default LSR ID is available. You are advised to use the IP address of the
loopback interface of the LSR as the LSR ID.
To modify the specified LSR ID, run the undo mpls command in the system view
to delete all MPLS configurations.
3. Run the mpls command to enable global MPLS and access the MPLS view.
4. Run the quit command to return to the system view.
5. Run the mpls ldp command to enable global LDP and access the MPLS-LDP
view.
6. Run the quit command to return to the system view.
7. Run the interface interface-type { interface-number | interface-
number.subinterface-number } command to access the interface view.
Interfaces indicate inbound interface GE1/0/2 and outbound interface GE1/0/3.
8. Run the mpls command to enable interface-based MPLS.
9. Run the mpls ldp command to enable interface-based LDP.
10. Run the quit command to return to the system view.
----End
Configuring Router2
The following uses Huawei NE80E as an example for describing how to configure
Router2 in MPLS VPN traffic injection.
Step 1 Set the IP address of the Router2 interface and loopback address serving as
the LSR ID. Use OSPF to notify the network segment connected to each interface and
the host route of the LSR ID.
Step 2 Configure basic MPLS functions.
1. Run the system-view command in the user view to access the system view.
2. Run the mpls lsr-id lsr-id command to set an LSR ID.
lsr-id specifies an LSR ID, in dotted decimal notation. It is used for identifying an
LSR.
Setting the LSR ID is the premise of configuring other MPLS commands.
No default LSR ID is available. You are advised to use the IP address of the
loopback interface of the LSR as the LSR ID.
To modify the specified LSR ID, run the undo mpls command in the system view
to delete all MPLS configurations.
3. Run the mpls command to enable global MPLS and access the MPLS view.
4. Run the quit command to return to the system view.
5. Run the mpls ldp command to enable global LDP and access the MPLS-LDP
view.
6. Run the quit command to return to the system view.
7. Run the interface interface-type { interface-number | interface-
number.subinterface-number } command to access the interface view.
The interface indicates the inbound interface GE1/0/1 of injected traffic.
8. Run the mpls command to enable interface-based MPLS.
9. Run the mpls ldp command to enable interface-based LDP.
10. Run the quit command to return to the system view.
Step 3 Configure a VPN instance.
1. Run the ip vpn-instance vpn-instance-name command to create a VPN
instance and access the corresponding view.
2. Run the route-distinguisher route-distinguishercommand to configure the RD
of the VPN instance.
The VPN instance takes effect only after specified with a RD. Before setting the
RD, you cannot configure any parameters except for the description.
3. Run the vpn-target vpn-target &<1-8> [ both | export-
extcommunity | import-extcommunity ] command to create a VPN-target
extended community for the VPN instance.
VPN Target is the attribute of the extended BGP community. VPN Target controls
the receiving and advertising of VPN routes. You can configure a maximum of
eight VPN targets at a time by running the vpn-target command. A VPN instance
can be configured with a maximum of 16 VPN targets.
4. Run the interface interface-type { interface-number | interface-
number.subinterface-number } command to access the interface view.
The interface indicates that through which Router2 connects to the Zone
network, that is, Router2 GE1/0/2 shown in Figure 7-11.
5. Run the ip binding vpn-instance vpn-instance-name command to bind the
interface to the VPN instance.
After the ip binding vpn-instance command is configured, Layer-3 features such as the specified IP
address and routing protocol are deleted on the interface. Re-configure them if desired.
6. Run the quit command to return to the system view.
Step 4 Configure MP-IBGP between PE devices.
1. Run the interface loopback number command to create a loopback interface.
The value of number ranges from 0 to 1023.
2. Run the ip address ip-address { mask | mask-length } [ sub ] command to set
the IP address of the loopback interface.
3. Run the quit command to return to the system view.
4. Run the bgp as-number command to access the BGP view.
5. Run the peer peer-address as-number as-number command to set the remote
PE device to the peer.
6. Run the peer peer-address connect-interface loopback interface-
number command to specify an interface for establishing the TCP connection.
The MP-IBGP peer must be established between PE devices through the the 32-
bit IP address of the loopback interface. This avoids route failure due to route
aggregation. The route to the loopback interface is advertised to the peer PE
device by using IGP on the MPLS backbone network.
7. Run the ipv4-family vpnv4 [ unicast ] command to access the BGP-VPNv4
subaddress family view.
8. Run the peer peer-address enable command to enable VPN-IPv4 route
exchange.
Step 5 Configure a route between the PE device and the CE device.
In practice, configure EBGP, static route, RIP, or OSPF between the PE device and the
CE device.
----End
Context
This function is configured on the Anti-DDoS.
To configure traffic diversion and injection, modify the original route on the network first. In the
complex network environment, if the route is incorrectly configured, the loop occurs and therefore
normal services are adversely affected. To identify the route fault in a timely manner, you are advised to
run the following command to enable the loop check function in practice.
After the function is enabled, the system automatically checks whether received packets are repetitive.
If yes, the loop occurs. After loop counts reach a value, the system automatically cancels the traffic-
diversion route to the destination IP address.
Procedure
Step 1 Run the system-view command in the user view to access the system view.
Step 2 Run the anti-ddos loop-check [ match-time match-times ] command to configure the
loop check function.
Parameter match-time specifies match times for loop packets. When the match times
exceeds the match-time value, the system cancels the traffic-diversion route. The default
match times is 4, that is, the system cancels the traffic-diversion route when loop packets
match for the fifth times.
After the check is complete, run the undo anti-ddos loop-check command to disable the
loop check function.
----End
Context
You can configure blackhole traffic diversion for the blackhole router to divert the traffic flood destined
to specific IP addresses to a blackhole IP address. In this way, the flood traffic will not occupy the
inbound bandwidth of the cleaning device, and the services of other customers are ensured. After you
enable blackhole traffic diversion, the blackhole router discards all traffic destined to the specified IP
address. Exercise caution when you use this function.
When the volume of traffic to a specific IP address is oversized, you can enable static blackhole
traffic diversion to discard traffic destined to this IP address.
2. Dynamic blackhole traffic diversion
After you enable dynamic blackhole traffic diversion, the ATIC management center automatically
delivers a blackhole traffic diversion policy if the traffic destined to a specific IP address exceeds the
specified threshold.
Procedure
1. Configure static blackhole traffic diversion.
Blackhole traffic diversion is specific to single IPv4 or IPv6 addresses, not to network segments.
d. Optional: Select Automatically enable.
e. Click OK.
Threshold: When the traffic destined to the specified IP address reaches the threshold, the
device enables dynamic blackhole traffic diversion.
Timeout: When dynamic blackhole traffic diversion runs for the specified period of time, the
device automatically disables dynamic blackhole traffic diversion.
d. Click OK.
----End
5. Attack Response and Source Tracing
5.1. Viewing the Status of a Zone and Anti-DDoS Alarms
After services are configured, you can view the status of a Zone and anti-DDoS alarms to monitor anti-
DDoS services.
Procedure
1. Check the status of a Zone.
a. Choose Defense > Policy Settings > Zone.
For details on the status of the Zone, see 3.2.6 Configuring the Zone-based Defense
Policy.
b. View anti-DDoS alarms and repair the anti-DDoS services according to repair
suggestions.
----End
Context
The system automatically enables the defense mechanism against certain attacks such as those on DNS
rate limiting by source IP address or domain name even if Defense Mode of a Zone is set to Manual.
Procedure
Step 1 Choose Defense > Policy Settings > Zone.
Step 2 Check the values in the State and Defense State columns.
If State of the Zone is Abnormal or Attacked, and Defense State is Not
defended or Part Defended, perform the following operations to handle abnormal
events. Otherwise, no operation is required.
Step 3 Click the state value of the State column.
Step 4 On the Abnormal Events tab page, search abnormal events on the detecting
device and cleaning device of the Zone.
Step 5 Select the event (of the cleaning device) whose Defense
Status is Undefended and click , enable the defense mechanism of the
cleaning device against abnormal events.
Only the cleaning device can handle abnormal events.
----End
5.3. Packet Capture
Packet Capture
The ATIC management center delivers packet capture, analysis, and report for subsequent maintenance.
Packet capture is used to capture network traffic and locate network faults; analysis is used to analyze
network traffic and attack logs; a report is used to periodically summarize Zone traffic and attack logs if
desired.
Packet Capture
In packet capture, the Anti-DDoS captures packets according to the packet capture task delivered by the
management center. Then the device encapsulates captured packets in a fixed format and sends them
to the anti-DDoS collector for resolution.
In actual applications, packet capture is mainly used to analyze and locate network problems. Different
packet capture types are applicable to diversified application scenarios:
When the Anti-DDoS does not detect attacks, and packet loss occurs on the protected network or
access fails, you can adopt ACL-based packet capture to identify packet types and thereby analyze
defense failure.
The Anti-DDoS captures the packets discarded by attacks upon the Zone. This assists in analyzing
attack events.
The Anti-DDoS captures the abnormal packets of different types. This assists in analyzing abnormal
events.
After the packet-capture task is complete, the captured packets are saved in the packet-capture file.
With the packet-capture file, you can view attack events, trace attack sources, parse attack packets, and
extract fingerprints for locating attacks, and obtaining features and details on attackers, so that proper
defense policies can be configured. The packet-capture file can also be downloaded to the local for
other operations.
By viewing abnormal or attack events associated with the packet-capture file, you can analyze their
details.
You can obtain information about attack sources by using attack source tracing. Additionally, the
system adds suspicious source IP addresses to the static blacklist to effectively defend against
attacks.
3. Packet parsing
4. Fingerprint extracting
With fingerprint extracting, the system extracts the features of abnormal or attack packets.
Additionally, the system adds extracted fingerprints to the Zone fingerprint list as the reference of
traffic cleaning.
The packet-capture file can be downloaded to the local for future operations .
Analysis
The ATIC management center provides several types of analysis, traffic analysis,
anomaly/attack analysis, DNS analysis, HTTP analysis, SIP analysis, and Botnets/Trojan
horses/Worms Analysis. Thereby, the administrator can comprehensively learn about
network data in a timely manner and export the analysis result.
Figure 5-1 shows the analysis diagram.
Report
The ATIC management center comes with both the system report and the Zone report, and supports
diversified reports. The system provides scheduled report generating and downloading functions for
comprehensive reports. This minimizes labor investment and facilitates periodical network status
monitoring and further query.
The packet capture length is the length of each packet captured by the Anti-DDoS. Each Anti-DDoS is
configured with only one packet capture length, which applies to all capture tasks on the Anti-DDoS.
Prerequisites
You have configured the Encryption Key of Packet Capture.
1. Choose Defense > Network Settings > Collectors.
Encryption Key
Before configuring a packet capture task, configure a key for encrypting packet capture logs. The Anti-
DDoS uses this key to encrypt packet capture logs and then sends the logs to the ATIC management
center. The ATIC management center uses this key to decrypt the logs and process them. If the key is
deleted, no packet is captured even though a packet capture task has been configured.
Procedure
Step 1 Choose Defense > Policy Settings > Global Policy
Step 2 Click in the Operation column.
Step 3 Choose one method from Configure Packet Capture Length.
Step 4 Click Deploy to deliver configurations to the device.
Step 5 In the Deploy dialog box, display the deployment progress. After the
deployment is complete, the dialog box closes automatically.
1. If the deployment succeeds, Deployment of the Zone is displayed as Deploy
Succeed.
2. If the deployment fails, Deployment of the device is displayed as Deploy Failed.
----End
Follow-up Procedure
Choose Defense > Policy Settings > Global Policy, select the check box of the device and
The ATIC Management center provides the packet capture function by delivering packet capture
tasks such as the ACL-based, global, attack event-based, and anomaly-based packet capture
tasks to Anti-DDoS. According to the packet capture tasks, anti-DDoS devices capture packets,
generate packet capture files, and save the files to the anti-DDoS collector for future analysis.
Create
Click to create a packet capture task in the ATIC Management
center. For details, see 5.3.3.1 Creating an ACL Matched Packet Capture
Task, 5.3.3.2 Creating a Global Defense Packet Capture Task, 5.3.3.2 Creating
a Global Defense Packet Capture Task and 5.3.3.4 Creating an Anomaly-
based Packet Capture Task.
Enable Select the check box of the packet capture task to be enabled and
click . The system delivers commands to the Anti-DDoS to
implement the packet capture task.
NOTE
If the packet capture type is Zone Attack Matched or Zone Anomaly Matched, the
packet capture task can be enabled only after policies are successfully deployed on the
Zone of the task.
Disable Select the check box of the packet capture task to be disabled and
click . The ATIC Management center delivers commands to the
Anti-DDoS to cancel the packet capture task.
Select the check box on the title bar and click above the list to
delete all the displayed packet capture tasks.
View 1. Click the name of the packet capture task to be viewed for details on the
task.
2. Click Close to close the dialog box.
Search Basic search
In the basic search area, select Device and State as search conditions, and
then click .
Advanced search
1. Click Advanced Search.
2. In the advanced search area that is displayed, set search conditions
such as Device, State, Zone, Type or Task Name, and then
click Search.
2. The packet capture length was configured. For details, see 3.3.2 Configuring Packet Capture Length.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Task Name Indicates the packet capture task name. The name cannot be
empty or null.
Characters, such as
apostrophes ('), vertical
bars (|), backslashes (\),
commas (,), less than
(<), greater than (>),
ampersands (&),
semicolons (;), inch
Parameter Description Reference Value
Sampling Indicates the ratio of the number of packets The default value
Ratio complying with packet capture conditions to is 1024:1. In this value,
that of captured packets. the device captures one
packet from 1024
packets that match
packet capture
conditions.
Captured If the packet capture type is Global Defense The default value
Packet Matched or ACL Matched, the value is the is 1000.
sum of packets captured by the device.
When the number of captured packets
hits Captured Packet and a packet capture
operation is complete, the packet capture
task becomes in Disable state.
If packets are captured on the basis of Zone
Attack Matched and Zone Anomaly
Matched, the number of captured packets
is the number of packets (of the same
attack or anomaly) captured by each CPU.
For example, a device has four
CPUs, Captured Packet is set to 1000. If an
attack with ACK and UDP flood attack
packets is launched, the packet capture
result is as follows:
− 4 x
1000 ACK flood attack packets are
captured and four packet capture files
are generated.
− 4 x
1000 UDP flood attack packets are
captured and four packet capture files
are generated.
After the packet capture operation is
complete, the packet capture task is
in Enable state. Capture packets upon the
next attack.
Step 5 Add an ACL rule.
Parameter Description
3. Click OK.
The Create Packet Capture Task page is displayed.
Step 6 Click Next.
Step 7 Click , click Detection/Cleaning Device to add network elements, and click OK.
Step 8 On the Create Packet Capture Task page, click Finish.
The Packet Capture page is displayed. The packet capture task is displayed in the list.
Step 9 Select the check box of a packet capture task and click to enable the task.
Only one ACL-based packet capture task can be enabled on an Anti-DDoS within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 3.3.3 Managing
Packet Capture Task.
Prerequisites
Service configurations are complete.
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Context
The detecting device detects traffic, but does not process the traffic. Only the cleaning
device can discard packets. Therefore, when you create a global discarding packet
capture task, Device can be only the cleaning device.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Task Name Indicates the packet capture task name. The name cannot be
empty or null.
Characters, such as
apostrophes ('), vertical
bars (|), backslashes (\),
commas (,), less than
(<), greater than (>),
ampersands (&),
semicolons (;), inch
marks ("), and percents
(%) cannot be included.
Sampling Indicates the ratio of the number of packets The default value
Ratio complying with packet capture conditions to is 1024:1. In this value,
that of captured packets. the device captures one
packet from 1024
packets that match
packet capture
conditions.
Captured If the packet capture type is Global Defense The default value
Packet Matched or ACL Matched, the value is the is 1000.
sum of packets captured by the device.
When the number of captured packets
hits Captured Packet and a packet capture
operation is complete, the packet capture
task becomes in Disable state.
If packets are captured on the basis of Zone
Attack Matched and Zone Anomaly
Matched, the number of captured packets
is the number of packets (of the same
attack or anomaly) captured by each CPU.
For example, a device has four
CPUs, Captured Packet is set to 1000. If an
Parameter Description Reference Value
Step 5 Click Next.
Step 8 Select the check box of a packet capture task and click to enable the task.
Only one global packet capture task can be enabled on an Anti-DDoS within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing
Packet Capture Task.
Context
Only the cleaning device discards packets when a Zone is under attack. Therefore, when
you create a Zone attacked packet capture task, Device can be only the cleaning device.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Task Name Indicates the packet capture task name. The name cannot be
empty or null.
Characters, such as
apostrophes ('), vertical
bars (|), backslashes (\),
commas (,), less than
(<), greater than (>),
ampersands (&),
semicolons (;), inch
marks ("), and percents
(%) cannot be included.
Sampling Indicates the ratio of the number of packets The default value
Ratio complying with packet capture conditions to is 1024:1. In this value,
that of captured packets. the device captures one
Parameter Description Reference Value
Captured If the packet capture type is Global Defense The default value
Packet Matched or ACL Matched, the value is the is 1000.
sum of packets captured by the device.
When the number of captured packets
hits Captured Packet and a packet capture
operation is complete, the packet capture
task becomes in Disable state.
If packets are captured on the basis of Zone
Attack Matched and Zone Anomaly
Matched, the number of captured packets
is the number of packets (of the same
attack or anomaly) captured by each CPU.
For example, a device has four
CPUs, Captured Packet is set to 1000. If an
attack with ACK and UDP flood attack
packets is launched, the packet capture
result is as follows:
− 4 x
1000 ACK flood attack packets are
captured and four packet capture files
are generated.
− 4 x
1000 UDP flood attack packets are
captured and four packet capture files
are generated.
After the packet capture operation is
complete, the packet capture task is
in Enable state. Capture packets upon the
next attack.
Step 5 Click Next.
Step 6 Click . Select a Zone from the Zone list and click OK to add the Zone.
Step 7 Click Next.
Step 8 Click , click Detection/Cleaning Device to add network elements, and click OK.
Step 9 On the Create Packet Capture Task page, click OK.
The Packet Capture Task page is displayed, with the packet capture task in the list.
Step 10 Select the check box of a packet capture task and click to enable the task.
Only one attack event-based packet capture task can be enabled for each Zone within a period of
time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing
Packet Capture Task.
Prerequisites
Service configurations are complete.
The packet capture length was configured. For details, see 8.3.2 Configuring Packet
Capture Length.
Policies are successfully deployed on the Zone.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Task Name Indicates the packet capture task name. The name cannot be
empty or null.
Characters, such as
apostrophes ('), vertical
bars (|), backslashes (\),
commas (,), less than
(<), greater than (>),
ampersands (&),
semicolons (;), inch
marks ("), and percents
(%) cannot be included.
Sampling Indicates the ratio of the number of packets The default value
Ratio complying with packet capture conditions to is 1024:1. In this value,
that of captured packets. the device captures one
packet from 1024
packets that match
packet capture
conditions.
Captured If the packet capture type is Global Defense The default value
Packet Matched or ACL Matched, the value is the is 1000.
sum of packets captured by the device.
When the number of captured packets
hits Captured Packet and a packet capture
operation is complete, the packet capture
task becomes in Disable state.
If packets are captured on the basis of Zone
Attack Matched and Zone Anomaly
Matched, the number of captured packets
Parameter Description Reference Value
After automatic fingerprint extraction is enabled and packets are captured, the ATIC
management center automatically extracts fingerprints, creates a fingerprint filter, and
delivers the fingerprints to all cleaning devices bound to the Zone. The conditions for
extracting fingerprints are as follows:
Fingerprint Fit Rate Indicates the matching ratio The value is an integer
before extracting ranging from 1 to 100, in
fingerprints. percentage.
When the packet number of pcap files has reached the number specification, fingerprint
will be extracted. Each time only one fingerprint, which has the highest hit rate, can be
extracted.
Fingerprint will be deployed as fingerprint filter to associated device. Fingerprint filter can
be manually deleted.
If the filter number has reached the upper limit, no more fingerprint filter will be created.
Step 5 Click Next.
Step 6 Click . Select a Zone from the Zone list and click OK to add the Zone.
Step 7 Click Next.
Step 10 Select the check box of a packet capture task and click to enable the task.
Only one anomaly-based packet capture task can be enabled for each Zone within a period of time.
----End
Follow-up Procedure
You can disable, view, or delete a packet capture task by referring to 8.3.3 Managing
Packet Capture Task.
The ATIC Management center captures packets that meet conditions in the packet
capture task, and save them into a packet capture file. The packet capture file can be
used by the administrator to view attack events, trace attack sources, parse attack
packets, and extract fingerprints for obtaining features and details on attackers, so that
suitable defense policies can be configured. The packet capture file can also be
downloaded to the local for other operations.
Choose Defense > Policy Settings > Packet Capture, click the Packet Capture File tab, and
manage packet capture files:
Parse
Click of a packet capture file in the Operation column to parse captured
Packet
packets. For details, see 8.3.4.3 Parsing Packets in a Packet Capture File.
Extract
Click of a packet capture file in the Operation column to extract
Fingerprin
fingerprints. For details, see 8.3.4.4 Extracting Fingerprints from a Packet
t
Capture File.
View Click Task Name of a packet capture file to view information about the
Packet packet capture task that generates the file.
Capture
Task
Delete Delete one packet capture file:
Click in the Operation column to delete the corresponding packet
capture file.
Delete files in batches:
Select the check boxes of multiple packet capture files and
click above the list to delete the selected files.
Select the check box on the title bar and click above the list to
delete all the displayed packet capture files.
For a packet capture file of Zone Attack Matched or Zone Anomaly Matched, you can
view related anomaly or attack events for further analysis.
Prerequisites
The packet capture task of Zone Attack Matched or Zone Anomaly Matched has been
created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Parameter Description
Zone Name Indicates the name of the Zone to which the destination IP address
under attack belongs.
End Time Indicates the end time of an abnormal one if the associated event is
an abnormal event. Otherwise, this field indicates the end time of an
attack.
Step 5 Click Close. Return to the Packet Capture File page.
----End
For the packet capture files of Global Defense Matched, Zone Attack Matched or Zone
Anomaly Matched, you can obtain attack sources by tracing a packet capture file.
Suspicious IP address can also be blacklisted for effective attack defense.
Prerequisites
The packet capture task of Global Defense Matched, Zone Attack Matched or Zone
Anomaly Matched has been created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click of a packet capture file in the Operation column to trace attack sources.
Step 4 On the Trace Source page, view the result of attack source tracing. For parameter
settings, see Table 8-7.
Parameter Description
Step 5 Optional: Select one or more check boxes of attack records and click Add Items to
Blacklist. Suspicious IP addresses are displayed in the blacklist of this Zone. The blacklist
entries take effect after deployment on NEs. For details on the deployment process,
see 6.2.12 Deploying the Defense Policy.
Blacklist is enabled for Zones. Attack sources are traced for packets captured after Zone Attack
Matched and Zone Anomaly Matched are enabled. Then the attack sources can be blacklisted.
Step 6 Click Close. Return to the Packet Capture File page.
----End
Prerequisites
A packet capture task has been created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
Step 3 Click of a packet capture file in the Operation column to parse captured packets.
Step 4 On the Packet Parsing page, you can view details on each packet, including the sending
time, source IP address, destination IP address, protocol type of the packet.
Step 5 Click each packet parsing record, the details are displayed in the group boxes in the
middle or below.
For the packet capture files of Zone Attack Matched or Zone Anomaly Matched, you can
obtain the features of anomalies or attacks by extracting fingerprints. The fingerprints
can be added to the Zone fingerprint list as the reference of traffic cleaning.
Prerequisites
The packet capture task of Zone Attack Matched or Zone Anomaly Matched has been
created and enabled.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture File tab.
The packet capture file can be downloaded to the local for future operations.
Procedure
Step 1 Choose Defense > Policy Settings > Packet Capture.
Step 2 Click the Packet Capture Task tab.
The ATIC management center provides four types of analysis: traffic analysis, abnormality/attack
analysis, DNS analysis, and HTTP(S) Analysis. This analysis helps the administrator comprehensively learn
about network data in real time. The ATIC management center also provides system and Zone reports in
diversified forms. The reports can be generated periodically. This function is labor-saving and facilitates
network status monitoring and query.
6.2. Traffic Analysis
Traffic analysis analyzes network traffic from all aspects.
6.2.1 Data Overview
Function
Data overview of traffic analysis displays various reports for analyzing traffic in a centralized
manner. This function collects traffic statistics of all devices or the specified device in different
time range granularities. You can use Data Overview to view the following types of reports:
1. Traffic Comparison
Collects statistics on the inbound traffic, outbound traffic, and attack traffic and compares
the three types of traffic. For details, see 6.2.2 Traffic Comparison.
Collects statistics on the traffic destined to Zones and displays data of the top N Zones. For
details, see 6.2.3 Traffic Top N.
4. IP Traffic Top 10
Collects statistics on the traffic to each IP address and displays data of the top N IP
addresses. For details, see 6.2.3 Traffic Top N.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Example
Data overview is displayed in Figure 6-1.
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 4: Click Search.
Step 5: Optional: Open or save the query results as files, or send queried reports to the
specified email address.
----End
6.2.2. Traffic Comparison
Function
The traffic comparison report displays traffic comparisons and changes of an Anti-DDoS, Zone, or IP
address within a period of time. If the device is an anti-DDoS cleaning device, you can view the incoming,
and outgoing traffic. If the device is an anti-DDoS detecting device, you can view the detected traffic.
Parameter
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. Traffic destined for the IP address is queried.
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days
and shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning), traffic comparison within a period of time is
displayed in Figure 6-2.
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 2: Click the Traffic Comparison tab.
Step 3: Set query parameters.
Step 4: Click Search.
The traffic comparison result that meets query conditions is displayed.
Step 5: Optional: Open or save the query results as files, or send queried reports to the
specified email address.
6.2.3. Traffic Top N
Function
Ranks traffic by destination IP address. If traffic anomalies occur, you can view IP
Traffic Top N to learn about the IP addresses with the largest volumes of
inbound or attack traffic.
Ranks traffic by Zone. If traffic anomalies occur, you can view Zone Traffic Top
N to learn about the Zones with the largest volumes of inbound or attack traffic.
3. Service Traffic Top N
Ranks traffic by service. If traffic anomalies occur, you can view Service Traffic
Top N to learn about the services with the largest volumes of inbound or attack
traffic.
Parameter
Table 6-3 shows parameters when Report Type is set to Zone Traffic Top N. Table 6-4 shows
parameters when Report Type is set to Service Traffic Top N. Table 6-5 shows parameters
when Report Type is set to IP Traffic Top N.
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is shorter than seven days, statistics are
collected hourly.
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is shorter than seven days, statistics are
Parameter Description
collected hourly.
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is shorter than seven days, statistics are
collected hourly.
Type Select a traffic type. The traffic types are Incoming Traffic and Attack
Traffic.
Statistics Select a mode for collecting statistics.
1. Average Value: indicates the average value of inbound traffic
or attack traffic within the specified time segment.
2. Peak Value: indicates the maximum value of inbound traffic
or attack traffic within the specified time segment. The peak
value can be selected only when a device is selected.
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Top N Enter the value of N.
Example
If the device is set to Total (Cleaning), traffic type to Attack Traffic, statistical method
to Average Value, and protocol type to Total, top N Zones by traffic within a period
of time are displayed in Figure 6-3.
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 4: Click Search.
The status of the top N Zone traffic of corresponding query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
4. Click to enter a recipient mail address and select an attachment
format. Then click OK.
----End
6.2.4. Application Traffic
Function
If application traffic anomalies or attacks occur, you can view the Application Traffic report to learn
about application traffic information. The ATIC management center collects statistics on application-
layer protocol traffic and user-defined service traffic and provides Traffic Comparison and Traffic
Distribution reports. The supported application-layer protocols include HTTP, HTTPS, UDP_DNS, and SIP.
1. Traffic Comparison
You can use Traffic Comparison to view the Zones or destination IP addresses under attacks,
comparison of inbound and outbound traffic, as well as the volume of attack traffic.
2. Traffic Distribution
You can use Traffic Distribution to view the protocol distribution of specific Zones or destination IP
addresses to determine whether to enable attack defense for a certain type of traffic.
Parameter
To query comparison between incoming and outgoing application traffic, set Report Type to Traffic
Comparison. (For parameters, see Table 6-6.) To query traffic distribution of all types of applications,
set Report Type to Traffic Distribution. (For parameters, see Table 6-7.)
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. Traffic destined for the IP address is queried.
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days
and shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
Parameter Description
The end time must be later than the start time and the interval
cannot be longer than one year.
1.If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Type Select a traffic type.
1. Incoming traffic: queries the distribution of all types of
applications in incoming traffic.
2. Attack traffic: queries the distribution of all types of
applications in attack traffic.
Example
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 2; Click the Application Traffic tab.
Step 3: Set query parameters.
Step 4: Click Search.
Step 5: Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Function
The protocol traffic distribution chart shows the proportion of the TCP, UDP, ICMP, and other traffic. You
can view the distribution of the inbound and outbound traffic of the cleaning device, and the
distribution of the detected traffic of the detecting device.
Parameter
Parameter Description
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning) and the Zone to Total, traffic distribution within
a period of time is displayed in Figure 6-5.
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 4: Click Search.
Step 5: Optional: Open or save the query results as files, or send queried reports to the
specified email address.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
----End
6.2.6. Number of TCP Connections
Prerequisites
You can view the number of new TCP connections by source IP address only after Top N TCP Source IP
Addresses by New Connection is enabled.
Function
Number of TCP connections provides visibility into the number of new TCP connections and number of
concurrent TCP connections by destination IP address, and number of new connections by source IP
address with the most connections. In normal cases, observe and record the number of new
connections and that of concurrent connections of services in the report. If the number of new
connections or the number of concurrent connections is greater than the normal value, capture packets
for analyzing anomalies or attacks.
Parameter
When Type is set to Destination IP Address, you can view the number of new connections and
concurrent connections by destination IP address. For parameters, see Table 6-9. When Type is set
to Source IP Address, you can view the number of new TCP connections by source IP address with the
most connections within the given time segment. For parameters, see Table 6-10.
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The number of connections to the IP address is queried.
Time Click to select the start time and end time of statistics. Or you can
Parameter Description
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to Total (Cleaning), Zone to Total, service to TCP, and statistical method to Average
Value, the number of connections within a period of time is displayed in Figure 6-6.
Procedure
Step 1: Choose Report > Report > Traffic Analysis.
Step 3
Step 4: Click Search.
Step 5: Optional: Open or save the query results as files, or send queried reports to the
specified email address.
----End
6.2.7. Board Traffic
Function
Board Traffic displays the traffic of the SPUs on a device.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1.If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to bj (Cleaning) and the protocol to UDP, board traffic within a period of time is
displayed in Figure 6-7.
Figure 6-7 Board traffic
Procedure
Step 1:Choose Report > Report > Traffic Analysis.
Step 4: Click Search.
Step 5: Optional: Open or save the query results as files, or send queried reports to
the specified email address.
----End
6.2.8. IP Location Top N
Function
The IP Location Top N report provides visibility into the Top N IP locations that have the maximum
volume of incoming or attack traffic.
Do not add user-defined IP locations to or delete them from an anti-DDoS device. Otherwise, the IP
Location Top N report on the ATIC is inaccurate.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
2. if the query interval is shorter than one day, statistics are collected
every five minutes.
Traffic.
Incoming Traffic or Attack Traffic can be selected for anti-DDoS
cleaning devices, and only Incoming Traffic can be selected for anti-
DDoS detecting devices.
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Example
If the device is set to Total (Cleaning), zone to Total, traffic type to Incoming Traffic, top N IP locations
that have the maximum incoming traffic in a specific period will be displayed, as shown in Figure 6-8.
Procedure
Step 1: Choose Report > Report > Traffic Analysis
Step 4: Click Search.
The status of the top N IP locations that match the query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
----End
Function
This report provides visibility into the incoming or attack traffic of a specific IP location.
Do not add user-defined IP locations to or delete them from an anti-DDoS device. Otherwise, the IP
Location Top N report on the ATIC is inaccurate.
Parameter
Unit Select a traffic measurement unit. The unit can be pps or kbit/s. The
default unit is pps.
Figure 6-9 Incoming traffic of a specific IP traffic
Procedure
Step 1: Choose Report > Report > Traffic Analysis
Step 4 : Click Search.
Information about IP location traffic that matches the query conditions is displayed.
If a Zone has been deleted, the Zone name is displayed as Unknown Zone.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Click to open or save the query results as PDF files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as EXCEL files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as CSV files. All data except
figures can be displayed.
Click to enter a recipient mail address and select an attachment format.
Then click OK.
----End
6.3.1 Anomaly/Attack Details
Function
The anomaly/attack details records basic information about all anomalies and attacks, and you can
locate anomaly or attack events.
Parameter
Example
Anomaly/attack details that meet the query conditions are displayed, as shown in Figure 6-10.
Procedure
Step 1: Choose Report > Report > Anomaly/Attack Analysis.
Step 2: Click the Anomaly/Attack Details tab.
Step 3: Set query parameters.
Step 4: Click Search.
Step 5: On the Anomaly/Attack Details page, click to view details on anomaly/attack
logs.
1. Click to view packet capture files associated with anomaly or attack events.
You can trace attack sources, resolve packets based on the packet capture files,
and download the files to obtain the details on and features of the attacker. In
this way, you can work out proper defense policies..
You cannot view the packet capture files associated with certain anomaly or
attack events.
2. Click to view details on an attack.
Step 6 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
6.3.2 Anomaly/Attack Top N
Function
Zone anomaly/attack top N sorts top N Zones by number or duration of anomalies/attacks.
Parameter
Parameter Description
Parameter Description
Device Select a device from the drop-down list. Total Cleaning and Total
Detecting are described as follows:
1.Total (Cleaning):
Indicates that attack traffic on all cleaning devices is queried.
2. Total (Detecting):
− If two or more detecting devices in a defense group work in Load
Redundancy mode, the maximum anomaly traffic volume in the
defense group is queried and the sum of anomaly traffic volumes
among defense groups is queried.
− If two or more detecting devices in each defense group work in Load
Balancing mode, the sum of anomaly traffic volumes within each
defense group and among defense groups is queried.
Zone Click , select a Zone on the Zone page that is displayed, and then click OK.
Time Click to select the start time and end time of statistics. Or you can change
the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot be
longer than one year.
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval cannot
be longer than one year.
Example
If the Device is Total (Cleaning), Figure 6-12 shows top N Zones by anomalies or attacks within a
period of time.
Procedure
Step 4 Click Search.
Top N Zones by anomalies or attacks that meet the query conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Click to open or save the query results as PDF files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as EXCEL files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as CSV files. All data except
figures can be displayed.
Click to enter a recipient mail address and select an attachment format.
Then click OK.
----End
6.3.3. Attack Top N
Function
Attacks Top N sorts attack events by top N number of attack packets or top N duration of attacks, and
displays corresponding details.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
Example
If the Device is set to Total (Cleaning), top N attack events within a period of time are displayed in Figure
6-13.
The upper chart displays top N attack events by attack packet quantity.
The lower chart displays top N attack events by attack duration.
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Attack Top N tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N attacks that meet the query conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Function
In the anomaly/attack type distribution chart, you can view the proportions of various anomaly/attack
types.
Parameter
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The anomaly/attack traffic destined for the IP address is
queried.
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
Example
If the Device is set to Total (Cleaning) and the Zone to test, the distribution of anomaly/attack types
within a period of time is displayed in Figure 6-14.
In the left figure, the distribution chart of attack types is displayed by times.
In the right figure, the distribution chart of attack types is displayed by packet
quantity.
If the device is set to total (Detecting) and the Zone to test, Figure 6-15 shows anomaly/attack type
distribution within a period of time.
NOTE:
The distribution chart of anomaly types is displayed by number of anomalies/attacks.
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 2 Click the Distribution of Anomaly/Attack Types tab.
Step 3 Set query parameters.
Step 4 Click Search.
The distribution of anomalies/attacks that meet the query conditions is displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Click to open or save the query results as PDF files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as EXCEL files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as CSV files. All data except
figures can be displayed.
Click to enter a recipient mail address and select an attachment format.
Then click OK.
----End
Function
The packet discarding trend helps you learn about the traffic trend of various packets discarded by the
cleaning device.
Parameter
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The anomaly/attack log of traffic destined for the IP
address of the Zone is queried.
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
Example
If the Device is set to Total (Cleaning), the packet discarding trends within a period of time are displayed
in Figure 6-16.
This chart is an overlay discarding packets chart. Through the chart, you can view the total numbers of
discarding packets at a point in time and traffic change trends of various discarding packets.
Procedure
Step 1 Choose Report > Report > Anomaly/Attack Analysis.
Step 4 Click Search.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
----End
6.4. DNS Analysis
DNS analysis analyzes DNS services on the network in all aspects.
6.4.1. Top N Request Trend
Prerequisites
Top N Requested Domain Names and Top N DNS Source IP Addresses by Request Traffic Rate are
enabled. For details, see 6.2.6.9 Top N Study.
Function
The top N DNS request trend displays top N requested domain names or top N source IP addresses by
DNS request traffic rate in incoming traffic, outgoing traffic, or detecting traffic.
Add top N domain names to the DNS cache to improve the response rate and reduce burdens on the
DNS server.
Limit the packet rates of top N domain names.
Limit the packet rates of top N source IP addresses.
Parameter
Paramete Description
r
click OK.
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time must be later than the start time and the interval
cannot be longer than one year.
If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
If the query interval is shorter than one day, statistics are
collected every five minutes.
Type Select the top N types to be queried.
1. Domain Name Request: indicates the trend of top N domain names
that are mostly requested.
2. Source IP Address Request: indicates the trend of top N source IP
addresses that request the DNS server most.
Example
If the Device is set to Total (Cleaning), traffic type to Domain Name Request, and statistical method
to Current Top N, top N trend analysis results with a period of time are displayed in Figure 6-17.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 2 Click the Top N Request Trend tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N trend analysis results are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Prerequisites
Top N DNS Source IP Addresses by Response Traffic Rate is enabled. For details, see 3.2.6.9 Top
N Study.
Function
The top N response trend diagram provides visibility into top N source IP addresses in DNS response
traffic.
You can limit the rate of DNS response packets by top N DNS source IP addresses. For details, see 3.2.6.5
DNS Defense Policy.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time must be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Example
If the Device is set to Total (Cleaning), traffic type to Average Top N, the top N response trend within a
given time segment is displayed, as shown in Figure 6-18.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 4 Click Search.
Top N trend analysis results that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Click to open or save the query results as PDF files. A
maximum of 10,000 entries can be displayed.
----End
Prerequisites
The DNS static cache function has been enabled and configured. For details, see 3.2.6.5
DNS Defense Policy.
Function
The DNS cache request trend collects statistics on external requests for domain names in
the DNS cache. If domain names in the DNS cache are seldom requested, replace them
with domain names that are frequently requested.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you can
Parameter Description
Example
If the Device is set to Total (Cleaning) and the Zone to Total, Figure 9-19 shows the
analysis results of the cache request trend within a period of time.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 4 Click Search.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
Prerequisites
The DNS statistics item has been enabled. For details, see 3.2.6.5 DNS Defense Policy.
Function
The request category trend collects statistics on DNS request packets and displays various DNS request
curves. This function allows you to monitor DNS traffic distribution on the live network.
Parameter
Parameter Description
The end time should be later than the start time and the interval
cannot be longer than one year.
1.If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are collected
every five minutes.
Type Select the DNS type of the request category trend to be viewed.
1. Total Traffic: Indicates the sum of TCP traffic and UDP traffic.
2. TCP
3. UDP
Example
If the Device is set to Total (Cleaning) and the Zone to Total, the trend analysis results of DNS within a
period of time are displayed in Figure 6-20.
Procedure
Step 4 Click Search.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Click to open or save the query results as PDF files. A maximum of
10,000 entries can be displayed.
Click to open or save the query results as EXCEL files. A maximum of
10,000 entries can be displayed.
Click to enter a recipient mail address and select an attachment format.
Then click OK.
----End
Prerequisites
The outgoing and incoming paths of the DNS request and reply packets must be the same. Otherwise,
the resolution success ratio stays zero all the time.
You must run the anti-ddos server-flow-statistic enable command on the inbound interface to enable
the upstream traffic analysis function.
Function
The successful resolution ratio is the ratio of the rate of responses from the DNS server to the rate of
requests for DNS services. When the DNS server is not attacked, observe and record the normal value of
the successful resolution ratio. If you find that the successful resolution ratio is strikingly lower than the
normal value, capture packets and check whether the DNS server is being attacked.
Parameter
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. DNS traffic destined for the IP address is queried.
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to total (Cleaning) and the Zone to Total, the success resolution ratio within a period
of time is displayed in Figure 6-21.
The request rate indicates the rate of requests for DNS services from the extranet.
The
response rate indicates the rate of responses by the DNS server to the external requests for
DNS services.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 4 Click Search.
----End
Function
The anomaly packet analysis chart displays the traffic status of normal and anomaly DNS request
packets.
Parameter
Parameter Description
IP Address Enter the destination IP address. Both IPv4 and IPv6 addresses are
applicable. The DNS traffic destined for the IP address is queried.
Time Click to select the start time and end time of statistics. Or you can
change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and shorter
than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are collected
every five minutes.
Example
If the Device is set to Total (Cleaning) and the Zone to Total, the analysis of the normal and anomaly
packets within a period of time is displayed in Figure 6-22.
Procedure
Step 1 Choose Report > Report > DNS Analysis.
Step 4 Click Search.
The analysis of the normal and anomaly packets that meet the query conditions is
displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
----End
Prerequisites
Top N HTTP Source IP Addresses by Traffic Rate is enabled. For details, see 3.2.6.9 Top N Study.
Function
Top N HTTP request sources by traffic display top N source IP addresses in HTTP incoming, outgoing, or
detecting traffic.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1.If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Unit Select pps or qps.
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP request sources by
incoming and outgoing traffic within a given time segment is displayed, as shown in Figure 6-23.
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 4 Click Search.
Top N HTTP request sources that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
----End
Prerequisites
Top N HTTPS Source IP Addresses by Traffic Rate is enabled. For details, see 3.2.6.9 Top N Study.
Function
Top N HTTPS request sources by traffic display top N source IP addresses in HTTPS incoming, outgoing,
or detecting traffic.
Parameter
Parameter Description
click OK.
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTPS request sources by
incoming traffic within a given time segment is displayed, as shown in Figure 6-25, top N HTTPS request
sources by outgoing traffic within a given time segment is displayed, as shown in Figure 6-26.
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 2 Click the Top N HTTPS Request Sources by Traffic tab.
Step 3 Set query parameters.
Step 4 Click Search.
Top N HTTPS request sources that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
Function
Top N HTTP URIs display top N URI fields in the HTTP traffic destined for the Zone.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time should be later than the start time and the interval
cannot be longer than one year.
1. If the query interval is longer than or equal to seven days and
shorter than one year, statistics are collected daily.
2. If the query interval is longer than or equal to one day and
shorter than seven days, statistics are collected hourly.
3. If the query interval is shorter than one day, statistics are
collected every five minutes.
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP URIs within a given
time segment is displayed, as shown in Figure 6-27.
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Step 4 Click Search.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
----End
Prerequisites
HTTP Host Top N is enabled. For details, see 3.2.6.9 Top N Study.
Function
Top N HTTP host fields display those in the HTTP traffic destined for the Zone.
Parameter
Parameter Description
Time Click to select the start time and end time of statistics. Or you
can change the time values in corresponding text boxes.
The end time must be later than the start time and the interval
Parameter Description
Example
If the Device is set to Total (Cleaning) and traffic type to Average Top N, top N HTTP host fields within a
given time segment is displayed, as shown in Figure 6-28.
Procedure
Step 1 Choose Report > Report > HTTP(S) Analysis.
Top N HTTP host fields that meet search conditions are displayed.
Step 5 Optional: Open or save the query results as files, or send queried reports to
the specified email address.
3. Click to open or save the query results as CSV files. All data
except figures can be displayed.
----End
6.6. Comprehensive Report
6.6.1. Querying Comprehensive Reports
You can query comprehensive reports that summarize various reports by Device or Zone.
Procedure
1. Query Device-based system reports.
Cycle type Queries the data between two For example, if you set Cycle
consecutive cycles. Typeto Week and 2012–08–07,
When you set Cycle the data within the week to which
Comparison to Display the cycle August 7, 2012 belongs.
comparison figure, configure this The Attack Comparison chart
item. displays the attack count
comparison between the week to
which August 7, 2012 belongs and
the last week.
Parameter Description Value
d. Click OK. On the file download page that is displayed, open or save the
system report.
If you need to reset the parameter, click reset.
2. Query Zone reports.
a. Choose Report > Comprehensive Report > Comprehensive Report.
b. Click the Zone Report tab.
c. Set Zone report parameters. For details, see Table 6-32.
2. Total (Detecting):
− If two or more detecting
devices in a defense group
work in Load
Redundancymode, the
maximum traffic volume in
the defense group is
queried and the sum of
traffic volumes among
defense groups is queried.
− If two or more detecting
devices in each defense
group work in Load
Balancingmode, the sum of
traffic volumes within each
defense group and among
defense groups is queried.
Cycle type Queries the data between two For example, if you set Cycle
consecutive cycles. Typeto Week and 2012–08–07,
When you set Cycle the data within the week to which
Comparison to Display the cycle August 7, 2012 belongs.
comparison figure, configure this The Attack Comparison chart
item. displays the attack count
comparison between the week to
which August 7, 2012 belongs and
the last week.
Time Click to select the start time -
and end time of statistics. Or you
can change the time values in
corresponding text boxes.
The end time should be later than
the start time and the interval
cannot be longer than one year.
When you set Cycle
Parameter Description Value
d. Click OK. On the file download page that is displayed, open or save the
Zone report.
If you need to reset the parameter, click Reset.
----End
Through scheduled task creation, the system periodically generates reports and sends the reports to the
specified email box. For the created scheduled task, you can change its status, delete it, or query the
task result.
Create
Click to create a scheduled task. For details, see 6.6.2.1
Creating a Scheduled Task.
Modify Click of a scheduled task to modify it. For the parameters,
see 6.6.2.1 Creating a Scheduled Task.
Enable
Click of the task in the Suspended state to switch it
to Enable.
Disable
Click of the task in the Enabled state to switch it
to Suspended.
A scheduled task is the task that generates reports periodically within the specified life cycle. It helps the
user query synthesis reports and sends the reports to the specified email box periodically.
Prerequisites
When you need to use the mailbox to receive the reports, you must complete the configuration of the
mail server in the ATIC Management center. For details, see 7.4.1 Mail Server.
Procedure
Step 1 Choose Report > Comprehensive Report > Scheduled Task.
Step 2 On the Scheduled Task List page, click to create a scheduled task.
Step 3 Configure scheduled task information. For details, see Table 6-33.
Step 4: Click OK.
You need to select at least one of the system report and Zone report.
Click the System Report tab, select the Device and report types to be queried, and fill in the email
address.
Click the Zone Report tab, select the Device and report types to be queried, and fill in the email
address.
The generated Zone reports will be sent to the email address. Before selecting Send to a user-
defined email box, ensure that an Email address has configured for Zone objects. For details,
see 3.1.1 Adding a Zone.
Step 6 Click ok.
----End
Follow-up Procedure
You can view or download reports generated by the scheduled task by performing 6.6.3 Downloading
Report.
6.6.3. Downloading Report
You can view, and download reports generated by scheduled tasks, and also perform management
operations such as searching, and deleting reports.
Choose Report > Comprehensive Report > Report Download, and manage generated reports.
6.7. Report Customization
6.7.1. Customizing Report-Related Information
6.7.2. Configuring IP Description
Configuring IP description provides visibility into the description of IP addresses in the IP description
report for easy management.
Operation
Choose Report > Report Customization > IP Address Description to manage IP description.
Create
Click to create an IP description. For details, see Creating an IP
Description.
Select the check box on the title bar and click above the list to
delete all IP descriptions.
Import 1. Click .
2. On the Import IP Address Description Entry page, click to download
a template to the local host, and enter parameters, and save the
template.
3. On the Import IP Address Description Entry page, click Browse..., select
the existing template, and click OK.
Imported IP descriptions are displayed in the IP description list.
Export
1. Select one or multiple IP descriptions and click .
2. On the File Download page, click Open to view the IP description list or
click Save to save the list to the local host.
Export
All 1. Click .
2. On the File Download page, click Open to view the IP description list or
click Save to save the list to the local host.
Search Enter the IP address or description of the IP description to be queried and
click to display the IP descriptions matching given conditions.
Creating an IP Description
Step 1 Choose Report > Report Customization > IP Address Description.
Configuring the system administrators can implement the configuration of system security policy,
permission/domain-specific management of the ATIC Management center, restriction to the IP
addresses that access the ATIC Management center, and can monitor and manage online administrators
in real time.
The system security policy contains the password policy, session timeout duration, and login policy.
The password policy defines the minimum length and complexity of the passwords of the
system administrators.
The session timeout duration refers to the period in which the session between the system
administrator and the ATIC Management center has been interrupted because of timeout. Any
operations of the system administrator on the ATIC Management center will clear the session
timeout duration and restart the time counting.
If the system administrator performs no operation within the timeout duration after logging in to
the ATIC Management center, the current session will be interrupted because of timeout. When the
system administrator wants to perform operations on the ATIC Management center again, the
system administrator needs to re-log in to the ATIC Management center.
The login policy defines whether the system will be locked after the password has been entered
incorrectly for a certain consecutive times within 10 minutes and when the system will be
unlocked automatically if the system is locked.
The permission/domain management of the ATIC Management center and the restriction to the IP
addresses that access the ATIC Management center are implemented by configuring the administrator
groups and administrators as follows:
The administrator groups are collections of the operation permissions. You can assign an
administrator group to administrator so that the administrator can have the permission on this
administrator group. The ATIC Management center provides three default administrator
groups, namely the administrator, operator, and auditor groups.
The system provides the default administrator admin. The default administrator has all
operation permission and can manage all resources. In addition, the default administrator
cannot be modified. You can create a new administrator and select an administrator group and
resources for this administrator to implement the permission/domain-specific management of
the ATIC Management center.
You can select the IP address segments that can access the ATIC Management center for an
administrator to implement the restriction of IP addresses that access the ATIC Management
center.
7.1.2. Managing Administrators
The system provides one default administrator admin. The default administrator has all permissions, can
manage all resources, and can log in the ATIC Management center from any IP addresses. To implement
permission/domain-specific management of the ATIC Management center, you can create
administrators and modify, lock, unlock, or delete them.
Create
Click to create an administrator. For details about this
operation, see 7.1.2.1 Creating an Administrator.
select the administrator and click to lock the administrator. After
the administrator is locked, its status becomes Locked. You can restrict
only the next login of the current administrator.
NOTE
The current administrator has the permission to lock an administrator.
The default administrator admin cannot be locked manually.
Unlock
Select the locked administrator and click to unlock the
administrator.
NOTE
The current administrator has the permission to unlock an
administrator.
Delete
Select one or more administrators and click to delete the
selected administrators.
NOTE
1. The current administrator has the permission to delete an
administrator.
2. An online administrator and the default administrator admin cannot
be deleted.
View Click the user name of an administrator to view its description, associated
administrator group, managed resources, and allowed IP address
segment.
5.1.2.1. Creating an Administrator
When you need to perform the permission/domain specific management of the ATIC Management
center, you can select an administrator group to obtain the permission on this administrator group,
select the resources, and set the IP address segment that can log in the ATIC Management center.
Context
Only the default administrator admin can perform one-click alarm clearing, configuration restoration, all
deployment and public configurations.
Procedure
Step 1 Choose System > System Administrators > Administrators.
Step 2 Click .
Step 3 Set the parameters of the new administrator, as described in Table 7-1.
Confirm Enter the password again. The parameter value must be the
password The two passwords must same as that in Password.
be identical.
Step 4 Configure the permissions, resources, and allowed IP address segment for the
administrator.
Step 5 Click OK.
----End
Follow-up Procedure
When RADIUS authentication is adopted for the administrator, you need to configure the RADIUS server.
For details, see 7.1.6 Configuring the Authentication Server.
The current administrator can modify the description and permission set of a non-default administrator
group as required. When the administrator group has associated users, the permissions of these users
will also be modified after the administrator group permission is modified. The modification of user
permissions takes effect upon the next login.
Context
The three default administrator groups administrator, operator, and auditor are not allowed to modify.
Procedure
Step 1 Choose System > System Administrators > Administrators.
After an administrator's permission is modified, the permission takes effect only after the administrator
re-logs in. However, the manageable resources take effect immediately after being modified without
requiring administrator re-login.
Step 5: Click OK.
----End
Different administrator groups have different permission sets. You need to select the owning
administrator group for the administrator to be created, so that the administrator can obtain the
permissions on this administrator group. The ATIC Management center provides three default
administrator groups, namely the administrator, operator, and auditor groups. These three default
administrator groups are not allowed to modify or delete.
Create
Click to create an administrator group. For details about
this operation, see 7.1.3.1 Creating an Administrator Group.
Delete
Select one or more administrator groups, and click to
delete the selected administrator groups.
An administrator group can be deleted only when it has no
associated administrator.
View Click the name of the administrator group, and view its description
and permission set.
Procedure
Step 1 7.1.3.2 Modifying an Administrator Group.
Step 2 Click .
Step 3 Configure the basic information and permission set for the new administrator
group.
Step 4 Click OK.
----End
The current administrator can modify the description and permission set of a non-default administrator
group as required. When the administrator group has associated users, the permissions of these users
will also be modified after the administrator group permission is modified. The modification of user
permissions takes effect upon the next login.
Context
The three default administrator groups administrator, operator, and auditor are not allowed to modify.
Procedure
Step 1 Choose System > System Administrators > Administrator Groups .
Step 4 Click OK.
----End
To prevent the login of an illegal administrator to the ATIC Management center, you can monitor the
online administrators in real time and forcibly log off the illegal administrators.
Prerequisites
1. To view the online administrators, the current administrator must have the permission to view the
online administrators.
2. To forcibly log off an online administrator, the current administrator must have the permission to
forcibly log off an online administrator.
Context
Session is the connection set up between the browser and the server. One administrator can generate
multiple sessions. The forcible logoff operation is applicable to only the administrator that generates the
session concerned. For example, administrator user logs in to the same server from clients A and B and
generates sessions a and b. When you forcibly log off the administrator user that generates session a,
the administrator user that generates session b will not be affected.
Procedure
Step 1 Choose System > System Administrators > Online Administrator .
Step 2 Do as follows to view the online administrators and their login information on
the Online Administrators page.
1. Click in the upper right corner of the page. The latest online administrators
and their login information are displayed.
2. To forcibly log off an online administrator, select the administrator and
----End
The system security policy contains the password policy, login policy, and session timeout duration.
Configuring the system security policy can improve the system security.
Procedure
Step 1 Choose System > System Administrators > Security Policy .
Step 2 Click .
Step 3 Set the security policy parameters on the Modify Security Policy page, as
described in Table 7-2.
Do not
set Complexity to No
limit. Otherwise, the
password is easy to
crack.
Set a validity Indicates the validity period of the This function is disabled
period for the administrator password. Password by default.
password validity period setting forces the You are advised to
administrator to change the password enable this function.
before the period ends. Otherwise, the
password is easy to
crack.
Step 4 Click OK.
----End
The authentication server needs to be correctly configured if administrator authentication uses the
Remote Authentication Dial-In User Service (RADIUS).
Prerequisites
An authentication server is available.
Procedure
Step 1 Choose System > System Administrators > Authentication Server.
Step 2 Click .
Step 3 On the Modify RADIUS Server page, set RADIUS server parameters that are
listed in Table 7-3.
Auth mode Mode for the RADIUS server 1.PAP: uses a plain text password and
to authenticate requires two-way handshakes.
administrators. Compared with CHAP
authentication, it is superior in
authentication efficiencies but
inferior in security.
2. CHAP: uses a cipher text password
and requires three-way
handshakes.
Compared with PAP
authentication, it is superior in
security but inferior in
authentication efficiencies.
Parameter Description Value
Port Port of the RADIUS server. Main and spare RAIDUS servers need
to use the same port.
Step 4 Click OK.
----End
7.2. System Maintenance
This section describes the configurations of performance monitoring, operation log dumping, anti-DDoS data
maintenance, and system backup.
7.2.1. Performance Monitoring
Monitoring the system performance means monitoring the server and database information. You can
monitor system performance by setting usage thresholds for all items of the server, to discover and
rectify anomalies as soon as possible and optimize system operating .
Procedure
Step 1 Choose System > System Maintenance > Performance Monitoring.
Step 2 Set the usage thresholds for the server.
3. Click OK.
The system collects the server and database performance data periodically.
Parameter Description
CPU If the CPU usage has exceeded the threshold for three consecutive
times, the ATIC Management center generates an alarm. When the CPU
usage becomes lower than the threshold, the alarm is cleared
automatically.
The red line represents the threshold.
Memory If the memory usage has exceeded the threshold for three consecutive
times, the ATIC Management center generates an alarm. When the
memory usage becomes lower than the threshold, the alarm is cleared
automatically.
The red line represents the threshold.
Disk If the disk usage exceeds the threshold, the ATIC Management center
generates an alarm. When the disk usage becomes lower than the
threshold, the alarm is cleared automatically.
Database The MySQL database capacity will grow automatically with the data
amount. In this case, you should check whether the used capacity is too
Parameter Description
large. Insufficient remaining disk spaces of the database will cause the
improper operating of the database and ATIC Management center.
----End
After you set the period for dumping operation logs, the system will automatically dump the operation
logs from the ATIC Management center to the specified directory on the ATIC Management center
server according to the specified period and reduce the recording times of the database and improve
the ATIC Management center operating efficiency.
Context
The dumped operation logs are saved to the Installation directory/Runtime/ LegoRuntime/
datastorage/ sysoptlog path on the ATIC Management center server. You can set the dumping period
for the logs and the number of recent days in which logs are reserved. For example, if the log dumping
period is set to 30 days, the logs in the recent 90 days are set to reserve, and the dumping is set to start
at 02:00:00, the ATIC Management center dumps the operation logs generated 90 days ago, the
database deletes the dumped logs and reserves only operations logs in the recent 90 days, and the ATIC
Management center performs the next dumping 30 days after the last dumping.
Procedure
Step 1 Choose System > System Maintenance > Log Dump.
Dump period (days) Period after which the Default value: 30 days.
ATIC Management center If the dumping period is
starts to dump logs. specified to 30 days, the
ATIC Management center
dumps logs once every 30
days.
Reserve recent data Logs that were generated Default value: 90 days.
Parameter Description Recommended Value
Step 4 Click OK.
----End
Result
When the specified dumping period and dumping time reaches, the ATIC Management center
automatically dumps the operation logs to the Installation directory/Runtime/
LegoRuntime/datastorage/sysoptlogpath on the ATIC Management center server. The dumped logs will
not be displayed in System Logs but stored in the specified directory. To view the dumped logs, you can
download the dumped logs in a file on the client and open the file in the text editing tool.
Follow-up Procedure
1. You can view the dumping records in the Historical Dumps area.
2. (Optional) You can click the compression package of the dumped logs to save the logs to the
specified path on the client.
3. (Optional) You can select the dumped logs that do not need to reserve and click to
delete the logs from the ATIC Management center server .
7.2.3. Dumping the Alarms
When the number of past alarms stored in the ATIC Management center database exceeds the threshold, the
ATIC Management center performance will be affected or the ATIC Management center will break down
even. Dumping the alarms dumps the events and the past alarms in a file to the specified folder, reducing the
burden of the ATIC Management center and improving the ATIC Management center performance. The alarm
dump function enables the ATIC Management center to dump the events and historical alarm data in the
database as files to the specified folder, which improves the ATIC Management center operating
performance.
Context
The ATIC Management center dumps the alarms stored in the database to the File dump path displayed
on the interface according to the specified dumping period. You can set the dumping period for the
alarms and the number of recent days in which alarms are reserved. For example, if the log dumping
period is set to 30 days, the alarms in the recent 90 days are set to reserve, and the dumping is set to
start at 02:00:00, the ATIC Management center dumps the alarms generated 90 days ago, the database
deletes the dumped alarms and reserves only alarms in the recent 90 days, and the ATIC Management
center performs the next dumping 30 days after the last dumping.
Procedure
Step 1 Choose System > System Maintenance > Alarm Dump.
Dump period (days) Period after which the Default value: 30 days.
ATIC Management center If the dumping period is
starts to dump alarms. specified to 30 days, the
ATIC Management center
dumps alarms once every
30 days.
Step 4 Click OK.
----End
Result
When the specified dumping period and dumping time reaches, the ATIC Management center
automatically dumps the alarms to the File dump path displayed on the interface. The dumped alarms
will not be displayed in Past Alarms but stored in the specified directory. To view the dumped alarms,
you can download the dumped alarms in a file on the client and open the file in the text editing tool.
Follow-up Procedure
1. You can view the dumping records in the Historical Dumps area.
2. (Optional) You can click the compression package of the dumped alarms to save the alarms to the
specified path on the client.
3. (Optional) You can select the dumped alarms that do not need to reserve and click to delete
the dumped alarms from the ATIC Management center server.
This section describes how to maintain anti-DDoS data by setting appropriate data reservation duration
to ensure high resource usage.
Procedure
Step 1 Choose System > System Maintenance > Anti-DDoS Data Maintenance.
Device logs (days) Indicates the duration for the ATIC The default value is
Management center server to retain the 30.
operation logs in the database.
Delay for Canceling For dynamic diversion tasks (including The default value is
Traffic Diversion both the automatic and manual ones), 300.
(seconds) after the anomaly or attack ends, the In normal cases, you
diversion persists for a while before it is are advised to use
automatically canceled to ensure that the default value. If
the anomaly or attack traffic is the anti-DDoS
thoroughly cleaned. collector cannot
receive the logs
about the anomalies
from the cleaning
device, the delay can
be extended.
The number of Indicates the number of pagesize for The default value is
pagesize ATIC Management center. 10.
Step 4 Click OK.
----End
This section describes how to back up system configurations periodically for timely troubleshooting.
Context
ATIC management center can support the configuration backup and some status information backup.
Ensure that other administrators are offline during the database backup. Otherwise, operating the
database by them may interrupt the backup.
Procedure
Step 1 Choose System > System Maintenance > System Backup.
Step 2 Click .
Step 3 On the Back Up Current Configuration File page, enter the description and
click OK to back up the current system configuration.
----End
7.2.5.2. Restoring a Configuration File
Restoring configurations consist of restoring configurations on the ATIC Management center and those
on the anti-DDoS device.
Context
ATIC management center can only be restored by the configuration file with the same version.
If the configuration of Zones or sysnames is different from that before restoration, the admin must
check and reallocate management permissions of these Zones or sysnames. Otherwise, other
administrators cannot manage the restored configuration.
Procedure
Step 1 Choose System > System Maintenance > System Backup.
Step 3 When the configuration file is restored, click OK and close the dialog box.
Click OK. Please continue with the following steps to make sure that ATIC
Management center and anti-DDoS device is consistent after configuration is
restored.
a. Choose System > System Maintenance > System Backup.
b. Click .
2. If no, roll back the configurations.
a. Choose System > System Maintenance > System Backup. The Check
System Status page is displayed.
b. In the Check System Status dialog box, click Roll Back Configuration to roll back
system configurations.
----End
Follow-up Procedure
Search Set the conditions and click Search to search for the desired logs. For
details about this operation, see 7.3.2 Searching for an Operation
Log, 10.3.3 Querying Device Operation Logs, and 7.3.4 Querying Syslog
Interworking Logs.
Export
Select the logs to save to the local computer and click . In the
displayed dialog box, select a path for saving the operation log file, enter a
name for the file or use the default file name, and click Save to save the
selected logs to the specified local path.
NOTE
If the Internet Explorer executes the default security policy, the To help
protect you security, Internet Explorer blocked this site from
downloading file from to your computer message is displayed upon an
export operation. In this case, right-click the message, and
choose Download File from the shortcut menu. After the interface is
refreshed, export the event information again.
Export
all Click . In the displayed dialog box, select a path for saving the
operation log file, enter a name for the file or use the default file name,
and click Save to save all the logs to the specified local path.
Log management includes managing system operation logs, device operation logs, and syslog
interworking logs.
Periodically dumping operation logs stores the logs recorded in the database to the Installation
directory/Runtime/LegoRuntime/datastorage/sysoptlog path on the ATIC Management center server.
You can download the dumped operation logs on the client and view them locally. In addition, you can
delete the logs that are no longer needed from the ATIC Management center server, reducing the
recording times of the database and ensuring sufficient database spaces.
The operation log level identifies the criticality of a log. The operation log level can be danger, minor,
warning, or info from the most critical to the least critical. Table 7-9 defines the different levels of logs.
Level Definition
Danger Refers to the operations that make the whole system or function modules
faulty or unavailable.
Minor Refers to the operations that may cause data inconsistency in system or
on function modules.
1. The ATIC management center allows you to view device operation logs and filter the logs based on
the logging start time, end time, device IP address, terminal IP address, VTY interface, user name,
VRF, and command line.
Device operation logs can be used to monitor the device or locate faults.
2. Device operation logs take up large database space and cannot be exported or dumped. You can
specify a period of time on the Anti-DDoS Data Maintenance page to regularly delete the reserved
device operation logs. The device operation logs are retained for 90 days by default.
You can set the conditions to search for the desired operation logs.
Procedure
Step 1 Choose System > Log Management > System Logs.
Step 2 Set the conditions for searching for operation logs.
1. You can select Search to use the basic search method. Table 7-10 describes the
parameters of the basic search conditions.
2. You can select Advanced Search to use the advanced search method. Table 7-
11 describes the parameters of the advanced search conditions.
----End
You can query the device operations conducted by the users logging in to the Anti-DDoS.
Procedure
Step 1 Choose System > Log Management > Device Logs.
Step 2 Query device operation logs by using the basic search or advanced search.
1. Basic search
Start Time Indicates the time when the ATIC management center
receives logs.
End Time
----End
7.3.4. Querying Syslog Interworking Logs
This section describes how to set the conditions for querying syslog interworking logs.
Procedure
Step 1 Choose System > Log Management > Syslog-linkage Log.
Step 2 Set the conditions for querying syslog interworking logs.
1. When you select Search, set the log query conditions based on the parameter
description in Table 7-13.
2. When you select Search, set the log query conditions based on the parameter
description in Table 7-14.
Table 7-14 Description of the parameters for advanced query of syslog interworking logs
Parameter Description
----End
7.4. Notification Server
7.4.1. Mail Server
You can configure the mail server to send the information to the specified email address.
Prerequisites
When a mail server is configured, ensure that the SMTP/POP3 function is enabled for sender accounts
registered on the server.
Context
The proxy server supports only the SOCKS 5 proxy when you configure the basic information for the mail
server.
The SOCKS protocol enables the client/server application programs in the TCP and UDP domains to
conveniently and securely use the network firewall. The proxy server that uses the SOCKS protocol is
called the SOCKS server and is a universal proxy server. The SOCKS proxy is usually used in the email and
is bound to port 1080 on the proxy server. If the SOCKS proxy service requires identity authentication,
you need to apply to the network administrator for a user name and password.
Procedure
Step 1 Choose System > Notification Server > Email Server.
2. Configure the basic information for the mail server, as described in Table 10-
15.
Username User name that is used to You can enter the user
access the SMTP server. name registered on the
This parameter is required SMTP mail server or
only when SMTP server obtained from the provider
identity authentication is of the mail server.
selected.
selected.
Proxy server Port Port number of the proxy Default value: 1080.
server.
This parameter is required
only when Proxy server is
selected.
Email Signature - -
Note:
After the parameters are specified, you can click Test to check whether the
testing email box can receive the testing message.
1. If yes, the communication between the ATIC Management center server and
the mail server is normal.
2. If no, an error message will be displayed. Handle the exception according to
the message.
3. Click OK.
----End
7.4.2. SMS Server
Procedure
Step 1 Choose System > Notification Server > SMS Server.
Step 2 In the SMS Server area, click .
Note: You can click Test to check whether the testing mobile phone can receive
the testing message.
1. If yes, the communication between the ATIC Management center server and
the SMS modem is normal.
2. If no, an error message will be displayed. Handle the exception according to
the message.
Step 3 Click OK.
7.4.3. Syslog Server
Procedure
Step 1 Choose System > Notification Server > Syslog Server .
Step 2 Set basic information of the log server.
Server port Port of the log server. The default value is 514.
----End