SCC Help >> SCC Typical Application

SCC Typical Application

Scenario

A network is under IP spoofing attacks. Although the firewall has blocked the attacks, it cannot prevent the attacker from initiating attacks. Therefore, it is necessary to use other methods to find out the attack source and deal with it accordingly.

Scenario Analysis

Based on the alarms received, SCC can take actions accordingly, such as adding the attack source users into the blacklist or logging them out. At the same time, SCC allows you to view the network locations (the connected network devices) of the attack sources and to isolate the attack sources.

In a word, SCC can not only notify administrators of potential threats in the network, but also automatically take actions to remove the threats.

Operation Procedure