Attack source and attack destination are two important parameters of an attack alarm. After receiving attack alarms, SCC can figure out the attack sources and destinations and further generate an alarm sketch map, that is, the security topology.
For each specific attack alarm, the system can also display the specific network devices and path that the attack traverses from the attack source to the destination in a topology called the attack path topology.
The security topology management function allows you to display the received attack alarms and their attack paths in a topology.