Security Topology
The security topology is a sketch map of attack alarms in the result of the last attack alarm query. Note that if multiple attack alarms are generated between two devices, the security topology displays only the last attack alarm.
Operation Procedure
- Click the Alarm tab, and then click Browse Attack Alarm in the SCC navigation tree to enter the Browse Attack Alarm page.
- Click the Attack Topology link at the top right corner of the Attack Alarm List. The security topology is displayed in the main pane. If the topology page is opened, you can also bring up the security topology by double-clicking the security topology node in the topology tree on the left of the page.
Topology Operations
- Right-click the selected link and then select Display Attack Path to open the Attack Path Topology.
- The attack path topology operations are the same as the platform topology operations. For more information, see Basic Topology Operation.
Precautions
- If multiple attack alarms are generated between two devices, the security topology displays only the last attack alarm.
Related Topics