Protection against UDP flood attack [Документация VAS Experts]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:dpi:dpi_options:opt_ddos:ddos_dos:ddos_dos_udpflood [2023/09/08 14:34] – external edit 127.0.0.1en:dpi:dpi_options:opt_ddos:ddos_dos:ddos_dos_udpflood [2024/09/26 15:29] (current) – external edit 127.0.0.1
Line 3: Line 3:
 This attack is handled by fragmented UDP packets. The target system has to spend a lot of resources to assemble and analyse them. This attack is handled by fragmented UDP packets. The target system has to spend a lot of resources to assemble and analyse them.
  
-The protection is carried out by disabling of unnecessary protocols on the site under protection. You can learn how to configure the protocol's filter here: [[en:dpi:dpi_options:opt_priority:priority_config:start|configuring priorities]].+The protection is carried out by disabling of unnecessary protocols on the site under protection. You can learn how to configure the protocol's filter here: [[en:dpi:dpi_options:opt_priority:priority_config|configuring priorities]].
  
 For a typical WEB site under protection, the required protocols are HTTP and HTTPS. Therefore the proper configuration looks like this: For a typical WEB site under protection, the required protocols are HTTP and HTTPS. Therefore the proper configuration looks like this: