F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Attack Protection Configuration Guide-6PW100
12
Figure 10 UDP flood detection configuration page
2. Select a security zone.
3. In the Attack Prevention Policy area, select the Discard packets when the specified attack is
detected box. Click Apply.
If you do not select the box, the device only collects UDP flood attack statistics.
4. In the UDP Flood Configuration area, click Add.
Figure 11 Adding a UDP flood detection rule
5. Configure a UDP flood detection rule, as described in 273HTable 4.
6. Click Apply.