R3721-F3210-F3171-HP High-End Firewalls Attack Protection Configuration Guide-6PW101
14
Figure 13 UDP flood detection configuration page
To configure UDP flood detection, follow these steps:
1. In the Attack Prevention Policy area, specify the protection action to be taken upon detection of a
UDP flood attack. If you do not select the Discard packets when the specified attack is detected
option, the firewall only collects UDP flood attack statistics.
2. In the UDP Flood Configuration area, view the configured UDP flood detection rules, or click Add
to enter the page shown in Figure 14 to
configure a UDP flood detection rule. Table 6 describes
the configuration items.
Figure 14 Adding a UDP flood detection rule
Table 6 Configuration items
Item Descri
p
tion
Protected Host
Configuration
IP Address
Specify the IP address of the protected host.
Action Threshold
Set the protection action threshold for UDP flood attacks that
target the protected host.
If the sending rate of UDP packets destined for the specified IP
address constantly reaches or exceeds this threshold, the
firewall enters the attack protection state and takes attack
protection actions as configured.