No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Feature Description - Security 01

This is NE40E V800R010C10SPC500 Feature Description - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
SOC Processing

SOC Processing

Figure 12-3 shows the attack detection and tracing process.

Figure 12-3 Attack detection and tracing process
  1. The SOC periodically obtains security-related system statistics, including packet loss caused by CP-CAR, CPU load, and service availability on each application module.
  2. The SOC works with the attack detection module to determine whether the system is under attack. If there is no attack, the SOC continues to collect statistics. If there is an attack, the SOC starts the attack source tracing process to locate the source of the attack.
  3. The SOC outputs a preliminary conclusion about the attack source to the module collecting packet summaries. After this module discovers suspicious attack packets, the SOC saves information about these packets in the database.
  4. After sampling packets, the SOC analyzes statistics and outputs attack reports based on the configured profile that describes how to identify an attack.
  5. The SOC delivers a policy to isolate or defend the attack based on users' requirements.
Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055047

Views: 14047

Downloads: 34

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next