Rate limiting : DoS prevention : Grouping DoS protection rules
 
Grouping DoS protection rules
Before you can apply them in a server policy via a protection profile, you must first group DoS prevention rules.
To configure a DoS protection policy
1. Before you can configure a DoS protection policy, you must first configure the rules that you want to include:
HTTP request flood prevention (see “Preventing an HTTP request flood”)
HTTP request rate limit (see “Limiting the total HTTP request rate from an IP”)
TCP connections per session (see “Limiting TCP connections per IP address by session cookie”)
TCP connection flood prevention (see “Limiting TCP connections per IP address”)
2. Go to DoS Protection > DoS Protection Policy > DoS Protection Policy.
To access this part of the web UI, your administrator’s account access profile must have Read and Write permission to items in the Web Protection Configuration category. For details, see “Permissions”.
3. Click Create New.
A dialog appears.
4. In Name, type a unique name that can be referenced by other parts of the configuration. Do not use spaces or special characters. The maximum length is 35 characters.
5. If you want to apply features that use session cookies, enable HTTP Session Based Prevention.
From HTTP Flood Prevention, select an existing rule that sets the maximum number of HTTP requests per second to a specific URL (see “Preventing an HTTP request flood”).
From Malicious IPs, select an existing rule that limits TCP connections from the same client (see “Limiting TCP connections per IP address by session cookie”).
6. If you want to restrict traffic based upon request or connection counts, enable HTTP Network Based Prevention.
From HTTP Access Limit, select a rule, if any, that you want to include (see “Limiting TCP connections per IP address”).
From TCP Flood Prevention, select a rule, if any, that you want to include (see “Preventing a TCP SYN flood”).
7. Click OK.
8. To apply the policy, select the DoS protection policy in an inline protection profile (see “Configuring a protection profile for inline topologies”).
9. If you have configured DoS protection features that use session cookies, also enable the Session Management option in the protection profile.
See also
Sequence of scans
Bot analysis