R3166-R3206-HP High-End Firewalls Attack Protection Configuration Guide-6PW101

12
Configuring UDP flood detection
From the navigation tree, select Intrusion Detection > Traffic Abnormality > UDP Flood to enter the UDP
flood detection configuration page, as shown in Figure 8. You can select a security zone and then view
and co
nfigure UDP flood detection rules for the security zone.
Figure 8 UDP flood detection configuration page
Do the following to configure UDP flood detection:
1. In the Attack Prevention Policy section, specify the protection action to be taken upon detection of
a UDP flood attack. If you do not select the Discard packets when the specified attack is detected
option, the firewall only collects UDP flood attack statistics.
2. In the UDP Flood Configuration section, view the configured UDP flood detection rules, or click Add
to enter the page shown in Figure 9 to configure a UDP flood detec
tion rule.
Figure 9 Add a UDP flood detection rule
Table 7 UDP flood detection configuration items
Item Descri
p
tion
Protected Host
Configuration
IP Address
Specify the IP address of the protected host.
Connection Rate
Threshold
Set the maximum UDP connection rate for the IP address.