You can enable the Security Operating Center (SOC) by enabling attack detection, attack source tracing, and attack defense.
Attack detection and attack source tracing are key SOC functions. Before using the SOC, ensure that these functions are enabled. If attack detection and attack source tracing are left disabled, the SOC can still be triggered by timers to collect the CPU usage, protocol module's state data, including the number of invalid packets and sessions, and CPCAR-related packet loss statistics. However, the SOC neither performs attack detection and attack source tracing nor generates alarms, and therefore cannot locate attack events.
After attack defense is enabled, the SOC automatically delivers attack defense policies if the NetEngine 8000 F is being attacked. This function isolates attacks or protects the NetEngine 8000 F against attacks.
The system view is displayed.
Attack detection and attack source tracing are enabled, and the SOC view is displayed.
Attack defense is enabled.
If the SOC determines that an attack event has occurred, enable attack defense.
The configuration is committed.