cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Who Me Too'd this topic

Tcp flood

L3 Networker

Hi,

today from 15.10 to 16.10 I received more than 15600 calls from the same IP. The Windows 2012 server already has a function against SYN ATTACK and TCP FLOOD, and I see it on the tcp-rst-from-server log monitor, but they are very small compared to those aged-out. It's been a month since I get continuous attacks and this sends my web application down. These attacks always come from different IPs. Block an IP but then a new one will appear even after days.

Here an example with some hidden fields for privacy.

 

attacco.jpg

 

I need to understand what kind of limit apply to DoS Protection rules. Have I to apply Aggregate or Classified type?

Actually I apply the rule to Aggregate mode with these settings:

 

SYN FLOOD


Action: SYN Cookies
Alarm Rate 30
Activate Rate 100
Max Rate 1000
Block Duration 300

UDP Flood
Alarm Rate 100
Activate Rate 1000
Max Rate 4000
Block Duration 300

 

ICMP Flood

 

Alarm Rate 100
Activate Rate 1000
Max Rate 4000
Block Duration 300

 

Other IP Flood


Alarm Rate 100
Activate Rate 1000
Max Rate 4000
Block Duration 300

 

I did not enable Zone Protection on the interface but I created a rule in Policies -> DoS Protection. I did a test by setting the rule in Protect and I find many logs but I'm afraid it's too restrictive and blocking even those who really need to connect to websites.

Here the screen

flood.jpg

 

I match one only syncookie-sent and this maybe restarted my application!

Besides, I can not understand what the firewall is blocking because TCP FLOOD makes not visible attacker and victim.

 

Please help me!

 

Who Me Too'd this topic