R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101
32
• Select zone Untrust.
• Select the Enable Scanning Detection option.
• Set the scanning threshold to 4500 connections per second.
• Select the Add the source IP to the blacklist option.
• Click Apply.
# Configure connection limit for the trusted zone.
Select Security > Intrusion Detection from the navigation tree and then select the Connection Limit tab to
enter the connection limit configuration page and perform the configurations shown in Figure 35.
Figure 35 Configure connection limit for the trusted zone
• Select zone Trust.
• Select the Discard packets when the specified attack is detected option.
• Select the Enable connection limit per source IP option and set the threshold to 100.
• Click Apply.
# Configure connection limit for the DMZ as shown in Figure 36.
Figure 36 Configure connection limit for the DMZ
• Select zone DMZ.
• Select the Discard packets when the specified attack is detected option.
• Select the Enable connection limit per dest IP option and set the threshold to 10000.
• Click Apply.
# Configure SYN flood detection for the DMZ.
Select Security > Intrusion Detection from the navigation tree and then select the SYN Flood tab to enter
the SYN flood detection confirmation page and perform the configurations shown in Figure 37.