The DDoS attack will send multiple requests to the attacked web resource with the aim of exceeding the website’s capacity to handle multiple request and prevent the website from functioning correctly. Syn Flood, UDP Flood, ICMP Flood and ICMPv6 Flood attacks can be detected and prevented.
General Rules | DESCRIPTION |
---|---|
Order No |
Determines the order of the rules. |
Status |
Allows the rule to be active or passive. |
Process |
Flood type to be blocked is selected (ICMP, ICMPv6, SYN, UDP) |
Log the Traffic |
If log is requested, the option is activated. |
Description |
Enter description. |
Scope | DESCRIPTION |
---|---|
Source Address |
Enter IPv4 or IPv6 adress. |
Destination Address |
Enter IPv4 or IPv6 address. |
Services |
Select the defined service or services to which the rule will apply. |
Connection Count Limits | DESCRIPTION |
---|---|
Limit Criteria |
The limit criterion to be blocked is selected. (Source Address, Destination Address, Matched Packet Count) |
Limit |
Maximum number of floods is written. |
Time |
Specifies the maximum number of seconds set as the limit. (Second) |
ePati Cyber Security Co.
Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY
Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39