Top 10 attack destinations report, The execution results report, Integrating scc with sms – H3C Technologies H3C Intelligent Management Center User Manual

Page 970

Advertising
background image

956

Top 10 attack destinations report

The Top 10 Attack Destinations report provides you with a pie chart displaying the distribution of attacks

by the attack destination IP address, as shown in

Figure 95

.

Figure 95 Top 10 attack destinations

To hide this graph, click the Collapse icon

located in the upper right corner of the graph.

To view a hidden graph, click the Expand icon

located in the upper right corner of the graph.

The execution results report

The Execution Result of Security Control Policy report provides you with a pie chart displaying the

distribution of execution results, as shown in

Figure 96

.

Figure 96 Execution result of security control policy

To hide this graph, click the Collapse icon

located in the upper right corner of the graph.

To view a hidden graph, click the Expand icon

located in the upper right corner of the graph.

Integrating SCC with SMS

The Security Management System (SMS) software is designed for network security monitoring and

management, enabling operators to obtain the status information and alarms from the security devices
on the network and manage the entire network security status in real time.
For unified management, you can integrate SCC with SMS and enter the SMS management page in

SCC to monitor the network-wide security devices.

Advertising