F3215-HP Load Balancing Module Security Configuration Guide-6PW101
179
Figure 79 ICMP flood detection configuration page
2. Select a security zone.
3. In the Attack Prevention Policy area, select the Discard packets when the specified attack is
detected box. Click Apply.
If you do not select the box, the device only collects ICMP flood attack statistics.
4. In the ICMP Flood Configuration area, click Add.
Figure 80 Adding an ICMP flood detection rule
5. Configure an ICMP flood detection rule, as described in Table 21.
6. Click Apply.