Intelligent Policy Center Help >> IPC and SCC Differences and Selection

SCC processes alarm sources of the attack alarm type. After receiving an attack alarm, SCC locates the attack source and destination in the topology and obtains the IP address and port of the access device of the attack source. Then, SCC restarts the device interface or the device to repair device faults by executing actions, such as deploying instructions or configuration file segments to the device. Information about the device interface or device to be restarted is not included in the original alarm data and can be obtained only through the topology location result.

IPC is developed based on SCC and is an extension of SCC. IPC processes alarm sources of device alarm and periodic event types.

Devices generate traps for device state changes and send traps to the system. Traps of this type are identified as device alarms. Both SCC and IPC can process device and attack alarms. SCC differs from IPC and performs topology location for access devices during processing alarms. By default, IPC does not perform topology location and supports topology location only in the shutdown action for interfaces. IPC can control only the devices that generate traps and cannot control access devices of alarm sources (except when the shutdown action for interfaces is executed).

IPC can also process periodic events. A periodic event defines a scheduled task. IPC allows users to configure the event source type as period event. Period events contain no alarm information, such as the device IP, device interface, and OID. IPC uses periodic events to trigger actions that are executed at specified time intervals. For example, for wireless devices to change passwords at a regular interval, add a periodic event configuration entry and associate the entry with the password deployment action through a policy. Then the system will automatically deploy passwords to the specified devices at the specified time interval.

Use SCC for attack alarm processing because SCC can locate the respective access devices of attack alarms.

Use IPC for device alarm processing. Both SCC and IPC can process device alarms. However, SCC needs a long time to locate devices in the topology when processing alarms, and the location results are used only for attack alarm processing.

Use IPC for periodic event processing.