F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Attack Protection Configuration Guide-6PW100
10
Figure 8 ICMP flood detection configuration page
2. Select a security zone.
3. In the Attack Prevention Policy area, select the Discard packets when the specified attack is
detected box. Click Apply.
If you do not select the box, the device only collects ICMP flood attack statistics.
4. In the ICMP Flood Configuration area, click Add.
Figure 9 Adding an ICMP flood detection rule
5. Configure an ICMP flood detection rule, as described in 272HTable 3.
6. Click Apply.