Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings:start [2024/09/16 11:09] – elena.krasnobryzh | en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings:start [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Configuring protection ====== | ||
- | {{indexmenu_n> | ||
- | |||
- | <note tip>The service can be configured through the GUI. [[dpi: | ||
- | |||
- | This protection trigs when a load goes beyond one of the thresholds configured by the file / | ||
- | < | ||
- | ddos_reqsec_threshold=300 | ||
- | ddos_reqsec_variation=5 | ||
- | </ | ||
- | here ddos_reqsec_threshold - is the number of requests per second addressed to the protected site. It is configured usually to be equal to maximal number of requests observed in normal operation.\\ | ||
- | ddos_reqsec_variation - is the deviation from requests' | ||
- | |||
- | < | ||
- | ddos_pktsec_threshold=5000 | ||
- | ddos_pktsec_variation=5 | ||
- | </ | ||
- | Here ddos_pktsec_threshold - is the number of packets per second that comes to the protected site. It is configured usually to be equal to maximal number of packets observed in normal operation.\\ | ||
- | ddos_pktsec_variation - is the deviation from packets' | ||
- | |||
- | The parameter ddos_reqsec_threshold has the priority over ddos_pktsec_threshold in case both are specified. The latest value is ignored in this case. | ||
- | |||
- | |||
- | The following parameter specifies the page containing CAPTCHA. One is redirected to this page for verification: | ||
- | < | ||
- | ddos_check_server=www.server_name.ru/ | ||
- | ddos_security_key=123567890 | ||
- | </ | ||
- | here the '' | ||
- | |||
- | Alert logging can be enabled by the following option | ||
- | < | ||
- | |||
- | The list of legit IP addresses can be obtained by the analysis of the protected site's WEB server' | ||
- | |||
- | This list is loaded to the DPI by the instruction: | ||
- | < | ||
- | fdpi_ctrl load --service 8 --file ip_list.txt | ||
- | </ | ||
- | Here ip_list.txt is the generated trusted list. | ||
- | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: | ||
- | |||
- | DPI can generate the access log by itslef, as described here: [[en: | ||
- | < | ||
- | fdppi_ctrl setenv --ddos_ip_gathering 1 | ||
- | </ | ||
- | It is switched off by sending 0 by this command. | ||
- | |||