Managing security attack alarms, Attack alarm list overview, Browsing the attack alarms list – H3C Technologies H3C Intelligent Management Center User Manual

Page 943

Advertising
background image

929

Managing security attack alarms

SCC provides you with two views for alarms, the Attack Alarm List and the Realtime Attack Alarm List.
The Attack Alarm List provides operators with visibility into all attack alarms, allowing you to view all

alarms and drill down into the details for the attack alarm. From the Attack Alarm List, you can also

perform basic and advanced queries to filter the Attack Alarm List for those attack alarms that meet their

search criteria and initiate actions including shutting down interfaces and notifying the appropriate staff
of a security event. From this list, operators can also view the results of the actions they have executed

against a security attack with a topology map of the attach path. For actions that support it, operators

can also restore an action.
The Realtime Attack Alarm List provides operators with a view of the Attack Alarm List filtered for the
most recent attack alarms. The Realtime Attack Alarm List offers operators the same functionality as the

Attack Alarm List for browsing attack alarms and attack alarm details, taking actions, viewing the results

an action, restoring an action, and viewing the topology of an attack path.

Attack alarm list overview

You can view all security threats detected by IMC from the Attack Alarm List, providing visibility into the

type of attack, its source, destination, and date and time stamp. From the Attack Alarm List, you can

navigate to the Alarm Details page to view more information for the associated attack alarm and use a
topology view of the attack using the Attack Path option. You can also execute an action for attack

alarms from the Attack Alarm List.

Browsing the attack alarms list

To browse all attack alarms:

1.

Navigate to Alarm > Browse Attack Alarm:

a.

Click the Alarm tab from the tabular navigation system on the top.

b.

Click the Security Control Center on the navigation tree on the left.

c.

Click the Browse Attack Alarm link located under Security Control Center on the navigation
tree on the left.
The Attack Alarm List displays in the main pane of the Browse Attack Alarm page.

Attack alarm list

Name: Contains the type of attack that was detected by IMC. The contents of this field serve as a
link to the Attack Alarm Details page. The Attack Alarm Details page provides more detailed
information on the attack. For more information about this feature, see "

Viewing attack alarm

details

."

Source: Contains the IP address of the device that initiated the attack, if known.

Destination: Contains the destination IP address of the attack, or rather the device that the attack
was intended for, if known.

Time: Contains a date and time stamp for IMC detection of the attack.

Correlated Policy: Contains the security control policy in IMC that is associated with the attack
identified in this attack alarm. If there is no security policy associated with the attack alarm, this field

contains the value "Undefined."

Result: Contains a status or summary of the result of any action IMC has taken to address the attack.

Advertising