No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Web-based Configuration Guide

AR650, AR1600, and AR6100 V300R003

This document describes how to configure and maintain your routers using the web platform.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Numerical

Numerical

Context

You can view intrusion defense statistics to check detection and defense records on the network threats such as Trojan horses and worm viruses. In this way, you can learn about the historical and current threat events and adjust the security policy or take defense measures.

You can view URL filtering statistics to know statistics about URLs that users access or attempt to access and match the URL whitelist and blacklist.

Prerequisite

To use the deep security function, you must enable it. By default, the deep security function is disabled.

  1. Open the Service Management page.

    Log in to the web system, choose System Management > System Configuration > Service Management to open the Service Management page, as shown in Figure 14-38.

    Figure 14-38  Service Management tab page

  2. Enable or disable deep security.
    • Enable deep security.

      In the Service Management area, click Enabled > Apply of Value-added security service to enable the deep security function.

    • Disable deep security.

      To disable deep security, click Disable and Apply, and restart the device.

      After the device restarts, the deep security configurations are deleted.

Procedure

  • Intrusion defense list

    • Viewing the intrusion defense list

    1. Access the Numerical tab page, as shown in Figure 14-39.

      Log in to the tab pageDeep Security and choose Numerical.

      Figure 14-39  Numerical tab page

    2. In the Defend List area, click Refresh.

      Current statistics about intrusions on the device are displayed in the Defend List area. Table 14-16 describes the parameters in the Defend List area.

      Table 14-16  Intrusion defense list parameters

      Parameter

      Description

      Applications

      Application type of an intrusion detected by the intrusion defense policy.

      Alert Events

      Number of alarm events detected by the intrusion defense policy.

      Block Events

      Number of block events detected by the intrusion defense policy.

    • Viewing top intrusions

    1. In the Defend List area, click View Top Assault. Detailed information about intrusions is displayed. Table 14-17 describes the parameters, as shown in Figure 14-40.

      Table 14-17  Intrusion parameters

      Parameter

      Description

      TOP Assault

      Number of intrusions whose detailed information is to be queried, such as 10, 20, 50, or 100.

      For example, when this parameter is set to 10, detailed information about the top 10 intrusions is displayed in the TOP Assault area.

      ID

      Signature ID of an intrusion detected by the intrusion defense policy.

      Name

      Signature name of an intrusion detected by the intrusion defense policy.

      Click Name. The Predefined Signature Details page is displayed. You can view detailed information about intrusions on this page.

      Attack Times

      Number of intrusions detected by the intrusion defense policy.

      Protocol

      Protocol of an intrusion detected by the intrusion defense policy.

      Severity

      Severity of an intrusion detected by the intrusion defense policy.

      Bully Type

      Threat type of an intrusion detected by the intrusion defense policy.

      Figure 14-40  TOP Assault

    • Clearing the intrusion defense list

    1. In the Defend List area, click Clear. In the dialog box that is displayed, click OK. Current intrusion defense statistics are cleared.
  • URL filtering list

    • Viewing the URL filtering list

    1. In the URL Filter List area, click Refresh.

      Current URL filtering statistics on the device are displayed in the URL Filter List area. Table 14-18 describes the parameters.

      Table 14-18  URL filtering statistics parameters

      Parameter

      Description

      Filter Events

      Type of users' HTTP request packets detected by the URL filtering policy.

      Achieve Times

      Number of times that the URLs in users' HTTP request packets match filtering rules.

    • Clearing the URL filtering list

    1. In the URL Filter List area, click Clear. In the dialog box that is displayed, click OK. Current URL filtering statistics are cleared.
Download
Updated: 2019-04-12

Document ID: EDOC1100041803

Views: 38088

Downloads: 103

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next