- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
The content you are looking for has been archived. View related content below.
Distributed Denial of Service (DDoS) attacks are all too common in today's internet of things. It's very cheap to rent an army of infected hosts — including infected refrigerators and home thermostats! — to lay siege to a network of your choosing.
Because it has gotten so easy to organize a DDoS attack, the reasons behind such attacks have gotten more diverse as well. In the past one needed skill and determination — so attacks were ideological or for massive profit. Today, disgruntled employees or upset neighbors with a little internet savvy could set up a DDoS on their target of choice.
Luckily, defending against these sorts of attacks is not that difficult and can be enabled with just a few clicks. I'm going to highlight some of the available options below.
One important thing to note before we get started is that Zone Protection provides protection at the ingress zone, the zone where traffic enters the firewall. So if you want to protect your DMZ from traffic originating from the internet (untrust), you will need to add a protection profile on the untrust interface.
The first tab of the zone protection profile (under Network > Network Profiles > Zone Protection) lands you on the settings you need:
The SYN Flood Protection has 2 types of protection available: Random Early Drop and SYN cookies. Both require a slightly different approach to the Activate and Alert threshold:
NOTE: This method indiscriminately discards SYN packets so it is recommended to set the activate rate as high as possible and some research might be required to determine your network's baseline.
NOTE: Using SYN cookies might seem the 'smarter' solution but it consumes more resources than RED. If SYN Cookies consumes too many resources, switch to RED. If you don’t have a dedicated DDoS prevention device in front of the firewall (at the internet perimeter), it's recommended to use RED.
Furthermore, you can activate a additional other protections:
Reconnaissance Protection prevents culprits from scanning your resources:
Packet Based Attacks Protection blocks malformed (malicious or otherwise) packets from entering your network:
Protocol Protection allows you to integrally block any protocols you might not like (for example PPP or GRE):
Ethernet SGT Protection allows you to create a list of Layer 2 Security Group Tags (SGTs) that you want to exclude. Apply the Zone Protection profile to a Layer 2, virtual wire, or tap interface. If an incoming packet with an 802.1Q (Ethertype 0x8909) header has an SGT that matches an SGT in your list, the firewall drops the packet.
NOTE: Zone Protection as the name indicates, covers a whole 'zone' which may include several different client-server permutations. And the total throughput for the zone may not correspond to what one single server is able to endure: a more subtle version of DDoS may target a single server to just bring it to the brink of failure, but not trigger the whole Zone Protection.
To protect a single resource, DoS Protection Profiles can be created to apply finely tuned micro-profiles:
Note that you can choose between aggregate or classified DoS Protection Profiles :
The principles for DoS Protection Profiles are the same as Zone Protection Profiles, except the values are tuned to the server's limits. Also a block duration was added to put any offending source IP addresses on a block list for a duration of time, and the maximum concurrently active sessions (under Resources Protection) can also be regulated, not to oversubscribe a server.
Please share if you know an admin that could use a quick refresher or hasn't bothered implementing these extra layers of protection.
Share your experience on how you protected your network from DDoS attacks !
Thank you for taking time to read this blog!
Don't forget to hit the Like (thumbs up) button and to Subscribe to the LIVEcommunity Blog area.
As always, we welcome all questions, comments and feedback in the comments section below.
Kiwi out!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
2 Likes | |
1 Like | |
1 Like | |
1 Like | |
1 Like |
User | Likes Count |
---|---|
3 | |
2 | |
2 | |
1 | |
1 |