No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE40E V800R010C10SPC500 Feature Description - Security 01

This is NE40E V800R010C10SPC500 Feature Description - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of SOC

Overview of SOC


To determine whether the NE40E is under attack, the Security Operating Center (SOC) constantly monitors statistics collected by security detection modules, service modules, and system monitoring modules.

If the system is under attack, the SOC tracks the source of the attack. To help administrators quickly rectify faults and restore services, the SOC samples attack packets to determine where the attack source is located and the cause of the attack.

A large number of protocol packets and control messages are sent to the control plane of the NE40E in one of the following scenarios:

  • The NE40E is maliciously flooded with packets.
  • A host on the network is infected with viruses.
  • A loop occurs on the network.

If the number of protocol packets and control messages sent to the NE40E exceeds the processing capacity of the CPU on the control plane, performance deteriorates and services on the NE40E are affected or even interrupted.


The SOC simplifies security maintenance. It generates concise attack reports based on intelligent checks and analysis, and allows administrators to easily locate sources of attack.


The SOC offers the following benefits to carriers:

  • Monitors system security in real time and prevents lengthy service interruptions due to attacks.
  • Generates alarms and logs and rapidly determines the source and cause of the attack, allowing maintenance personnel to easily locate and rectify faults.
Updated: 2019-01-03

Document ID: EDOC1100055047

Views: 14185

Downloads: 34

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next