No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Log Reference

AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R007

This document supports all the logs of device, including the parameters, meaning, possible causes and solution.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).




AttackType:[type];Receive Interface:[intf]; proto:[proto];from [IP]:[Port];to [IP]:[Port];

begin time:[year/month/day hour:minute:second]; end time: [year/month/day hour:minute:second]; total packets: [pktcount];


The attack packets of the specified type passed through the device and were filtered out by the firewall.


Parameter Name Parameter Meaning
[type] Indicates the attack type. The value is a string of characters, for example, IP-sweep attack, and land attack.
[intf] Indicates an attacked interface.
[proto] Indicates the protocol type of attack packets.
from [IP]:[Port];to [IP]:[Port] Indicates the source address and destination address of an attack.
begin time:[year/month/day hour:minute:second]; end time: [year/month/day hour:minute:second] Indicates the begin time and end time of an attack.
[pktcount] Indicates the total number of attack packets.

Possible Causes

If the attack defense log was enabled, the firewall recorded logs about attack packets that were filtered out.


  1. Check logs to view the source address, destination address, and type of the attack. If necessary, modify the firewall configuration to improve the ability to filter out attack packets from specified sources on the network and protect the specified network host.
Updated: 2019-05-29

Document ID: EDOC1000097209

Views: 128384

Downloads: 189

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next