After configuring attack source tracing parameters, check the configurations. If some parameters are not configured, their default values are displayed.