< Home

Verifying the Attack Source Tracing Configuration

Procedure

  • Run the display auto-defend attack-source [ history [ begin begin-date begin-time ] [ slot slot-id ] | [ slot slot-id ] [ detail ] ] command to check attack sources.
  • Run the display auto-defend configuration [ cpu-defend policy policy-name ] command to check the configuration of attack source tracing in an attack defense policy.
  • Run the display cpu-defend policy [ policy-name ] command to check the attack defense policy.
  • Run the display auto-defend whitelist [ slot slot-id ] command to check information about the attack source tracing whitelist.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic