HP VPN Firewall Appliances Attack Protection Configuration Guide

14
Figure 12 DNS flood detection configuration page
2. Select a security zone.
3. In the DNS Flood Attack Prevention Policy area, select Enable DNS Flood Attack Detection, and
then click Apply.
The device will collect DNS flood attack statistics of the specified security zone, and output logs
upon detecting DNS flood attacks.
4. In the DNS Flood Configuration area, click Add.
Figure 13 Adding a DNS flood detection rule
5. Configure a DNS flood detection rule, as described in Table 5.
6. Click Apply.
Table 5 Configuration items
Item Descri
p
tion
Protected Host
Configuration
IP Address Specify the IP address of the protected host.
Action Threshold
Set the protection action threshold for DNS flood attacks that
target the protected host.
If the sending rate of DNS query requests destined for the
specified IP address constantly reaches or exceeds this
threshold, the device drops all extra requests and logs the
event.