R3721-F3210-F3171-HP High-End Firewalls Attack Protection Configuration Guide-6PW101
22
• Select zone Untrust.
• Select the Enable Scanning Detection option.
• Set the scanning threshold to 4500 connections per second.
• Select the Add the source IP to the blacklist option.
• Click Apply.
# Configure connection limits for the trusted zone.
From the navigation tree, select Intrusion Detection > Traffic Abnormality > Connection Limit. The
connection limit configuration page appears, as shown in Figure 24.
Figure 24 Configuring connection limit for the truste
d zone
Perform the following operations on the page:
• Select zone Trust.
• Select the Discard packets when the specified attack is detected option.
• Select the Enable connection limit per source IP option and set the threshold to 100.
• Click Apply.
# Configure connection limits for the DMZ as shown in Figure 25.
Figure 25 Configuring connection limit for the DMZ
Perform the following operations on the page:
• Select zone DMZ.
• Select the Discard packets when the specified attack is detected option.
• Select the Enable connection limit per dest IP option and set the threshold to 10000.
• Click Apply.
# Configure SYN flood detection for the DMZ.
From the navigation tree, select Intrusion Detection > Traffic Abnormality > SYN Flood. The SYN flood
detection confirmation page appears.