DoS / Flood Mitigation

The DDoS attack will send multiple requests to the attacked web resource with the aim of exceeding the website’s capacity to handle multiple request and prevent the website from functioning correctly. Syn Flood, UDP Flood, ICMP Flood and ICMPv6 Flood attacks can be detected and prevented.

image

DoS / Flood Mitigation - New Record

image

General Rules DESCRIPTION
Order No Determines the order of the rules.
Status Allows the rule to be active or passive.
Process Flood type to be blocked is selected (ICMP, ICMPv6, SYN, UDP)
Log the Traffic If log is requested, the option is activated.
Description Enter description.
Scope DESCRIPTION
Source Address Enter IPv4 or IPv6 adress.
Destination Address Enter IPv4 or IPv6 address.
Services Select the defined service or services to which the rule will apply.
Connection Count Limits DESCRIPTION
Limit Criteria The limit criterion to be blocked is selected. (Source Address, Destination Address, Matched Packet Count)
Limit Maximum number of floods is written.
Time Specifies the maximum number of seconds set as the limit. (Second)

ePati Cyber Security Co.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39