F3215-HP Load Balancing Module Security Configuration Guide-6PW101
178
Figure 78 Enabling Land and Smurf attack detection for the untrusted zone
Verifying the configuration
Check that the device can detect Land and Smurf attacks from the untrusted zone, output alarm logs
accordingly, and drop the attack packets.
You can select Security > Intrusion Detection > Statistics from the navigation tree to view the counts of
Land and Smurf attacks and the counts of dropped attack packets.
Configuring traffic abnormality detection
Configuring ICMP flood detection
ICMP flood detection is mainly intended to protect servers and is usually configured for an internal zone.
1. From the navigation tree, select Security > Intrusion Detection > ICMP Flood.
The ICMP flood detection configuration page appears.