Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2023/10/09 11:24] – elena.krasnobryzh | en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_settings [2024/11/29 10:25] (current) – elena.krasnobryzh | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ======ddos_ddos_settings====== | + | {{tag> |
+ | ====== | ||
+ | {{indexmenu_n> | ||
+ | |||
+ | <note tip>The service can be configured through the GUI. [[dpi: | ||
+ | |||
+ | This protection trigs when a load goes beyond one of the thresholds configured by the file / | ||
+ | < | ||
+ | ddos_reqsec_threshold=300 | ||
+ | ddos_reqsec_variation=5 | ||
+ | </ | ||
+ | here ddos_reqsec_threshold - is the number of requests per second addressed to the protected site. It is configured usually to be equal to maximal number of requests observed in normal operation.\\ | ||
+ | ddos_reqsec_variation - is the deviation from requests' | ||
+ | |||
+ | < | ||
+ | ddos_pktsec_threshold=5000 | ||
+ | ddos_pktsec_variation=5 | ||
+ | </ | ||
+ | Here ddos_pktsec_threshold - is the number of packets per second that comes to the protected site. It is configured usually to be equal to maximal number of packets observed in normal operation.\\ | ||
+ | ddos_pktsec_variation - is the deviation from packets' | ||
+ | |||
+ | The parameter ddos_reqsec_threshold has the priority over ddos_pktsec_threshold in case both are specified. The latest value is ignored in this case. | ||
+ | |||
+ | |||
+ | The following parameter specifies the page containing CAPTCHA. One is redirected to this page for verification: | ||
+ | < | ||
+ | ddos_check_server=www.server_name.ru/ | ||
+ | ddos_security_key=123567890 | ||
+ | </ | ||
+ | here the '' | ||
+ | |||
+ | Alert logging can be enabled by the following option | ||
+ | < | ||
+ | |||
+ | The list of legit IP addresses can be obtained by the analysis of the protected site's WEB server' | ||
+ | |||
+ | This list is loaded to the DPI by the instruction: | ||
+ | < | ||
+ | fdpi_ctrl load --service 8 --file ip_list.txt | ||
+ | </ | ||
+ | Here ip_list.txt is the generated trusted list. | ||
+ | You can learn more about fdpi_ctrl instruction and how to ensure data persistence here: [[en: | ||
+ | |||
+ | DPI can generate the access log by itslef, as described here: [[en: | ||
+ | < | ||
+ | fdppi_ctrl setenv --ddos_ip_gathering 1 | ||
+ | </ | ||
+ | It is switched off by sending 0 by this command. | ||
+ |