After the basic policy is configured, a basic defense policy is automatically generated on each associated device of the Zone to detect inbound traffic.
The AntiDDoS1820-N outbound defense policy is used to detect the following types of attack traffic. When the rate or bandwidth of the attack traffic exceeds the preset threshold, the AntiDDoS1820-N reports an anomaly event to the ATIC.
Attackers send SYN packets with forged source addresses to hosts. The hosts reply with SYN-ACK packets to the source addresses, but will not receive any ACK packets. As a result, the hosts keep many half-open connections until the connections time out. These half-open connections can exhaust host resources so that the hosts cannot establish normal TCP connections.
TCP fragments seldom occur in normal network traffic. If the number of TCP fragments increases on the network, DDoS attacks may occur. Attackers send large numbers of TCP fragments to the targets, which brings the following adverse impacts:
Attackers use botnets to send a large number of oversized UDP packets at a high rate to target servers, which brings the following adverse impacts:
Attackers send large numbers of UDP fragments to the targets, which brings the following adverse impacts:
Attackers send mass ICMP packets to the target in a short period of time, exhausting session resources on network devices. If the attackers send oversized packets over a network link, the network link may be congested.
of the Zone.
in the Operation column corresponding to the default defense policies starting with basic.
Parameter |
Description |
Recommended Value |
|
|---|---|---|---|
Tcp Syn Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of SYN packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Tcp Fragment Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of TCP fragments exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
UDP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of UDP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
UDP Fragment Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of UDP fragments exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
ICMP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of ICMP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||