Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:dpi:dpi_options:opt_ddos:ddos_dos:ddos_dos_udpflood [2023/09/08 14:34] – external edit 127.0.0.1 | en:dpi:dpi_options:opt_ddos:ddos_dos:ddos_dos_udpflood [2024/09/26 15:29] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
This attack is handled by fragmented UDP packets. The target system has to spend a lot of resources to assemble and analyse them. | This attack is handled by fragmented UDP packets. The target system has to spend a lot of resources to assemble and analyse them. | ||
- | The protection is carried out by disabling of unnecessary protocols on the site under protection. You can learn how to configure the protocol' | + | The protection is carried out by disabling of unnecessary protocols on the site under protection. You can learn how to configure the protocol' |
For a typical WEB site under protection, the required protocols are HTTP and HTTPS. Therefore the proper configuration looks like this: | For a typical WEB site under protection, the required protocols are HTTP and HTTPS. Therefore the proper configuration looks like this: |