Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2023/08/28 15:03] – edrudichgmailcom | en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2024/11/29 10:25] (current) – elena.krasnobryzh | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{tag> | ||
====== Configuring protection ====== | ====== Configuring protection ====== | ||
{{indexmenu_n> | {{indexmenu_n> | ||
+ | |||
+ | <note tip>The service can be configured through the GUI. [[dpi: | ||
+ | |||
This protection trigs when a load goes beyond one of the thresholds configured by the file / | This protection trigs when a load goes beyond one of the thresholds configured by the file / | ||
< | < | ||
Line 36: | Line 40: | ||
</ | </ | ||
Here ip_list.txt is the generated trusted list. | Here ip_list.txt is the generated trusted list. | ||
- | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: | + | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: |
- | DPI can generate the access log by itslef, as described here: [[en: | + | DPI can generate the access log by itslef, as described here: [[en: |
< | < | ||
fdppi_ctrl setenv --ddos_ip_gathering 1 | fdppi_ctrl setenv --ddos_ip_gathering 1 |