F3215-HP Load Balancing Module Security Configuration Guide-6PW101
181
Figure 81 UDP flood detection configuration page
2. Select a security zone.
3. In the Attack Prevention Policy area, select the Discard packets when the specified attack is
detected box. Click Apply.
If you do not select the box, the device only collects UDP flood attack statistics.
4. In the UDP Flood Configuration area, click Add.
Figure 82 Adding a UDP flood detection rule
5. Configure a UDP flood detection rule, as described in Table 22.
6. Click Apply.