检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Step 6: View the Protection Effect Through Attack Event Logs In the navigation pane, choose Log Audit > Log Query.
It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing.
It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing.
Figure 2 EIPs The administrator chose Log Audit > Log Query and clicked the Access Control Logs tab. He searched for the blocking logs of the access source IP address xx.xx.xx.94.
In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab. In the rows where Destination IP is a domain name matching example.com, the corresponding Action is Allow. For other traffic, the Action is Block.
How to Defend Against Access Control Attacks In addition to access control policy design, identity authentication, security audit and monitoring, security configuration and patch management, access control, vulnerability defense, security training and awareness improvement, and security
√ √ √ Log Audit Log Audit records the details of attack events, hit details of access control policies, and all traffic passing through the firewall.
In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab and click VPC Border Firewall. References For details about how to add other protection rules, see Adding a Protection Rule.
Step 5: Viewing Rule Hits in Access Control Logs In the navigation pane, choose Log Audit > Log Query. Click the Access Control Logs tab.
You can use the following examples to learn how to query a specific trace: Use CTS to audit Elastic Volume Service (EVS) creation and deletion operations from the last two weeks. For details, see Security Auditing.