Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2020/04/21 14:05] – lexx26 | en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2024/11/29 10:25] (current) – elena.krasnobryzh | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | {{tag> |
| + | ====== Configuring protection ====== | ||
| {{indexmenu_n> | {{indexmenu_n> | ||
| + | |||
| + | <note tip>The service can be configured through the GUI. [[dpi: | ||
| + | |||
| This protection trigs when a load goes beyond one of the thresholds configured by the file / | This protection trigs when a load goes beyond one of the thresholds configured by the file / | ||
| < | < | ||
| Line 36: | Line 40: | ||
| </ | </ | ||
| Here ip_list.txt is the generated trusted list. | Here ip_list.txt is the generated trusted list. | ||
| - | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: | + | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: |
| - | DPI can generate the access log by itslef, as described here: [[en: | + | DPI can generate the access log by itslef, as described here: [[en: |
| < | < | ||
| fdppi_ctrl setenv --ddos_ip_gathering 1 | fdppi_ctrl setenv --ddos_ip_gathering 1 | ||