How to Create DoS Policy on SonicOSX 7.0?

Description

This workflow unifies flood protection and connection limiting control through DoS rule settings, using source, destination as well as service objects, and action profiles into a single DoS rule. DoS policy rules define the ways you can protect your network against the following Denial of Service attacks:

  • UDP flood, ICMP flood, TCP SYN flood
  • Spank, Smurf, Land Attack Protection

Resolution

To configure a DoS Policy:

  1. Navigate to the Policy | Rules and Policies | DoS Policy tab and click on Top or Bottom at the bottom of the page.
    Image

  2. Give it a relevant name, you can use the following as a match criteria:
    1. IP Type - IPv4/IPv6
    2. Source Address
    3. Destination Address
    4. Service
    5. Schedule

  3. From here, you can use the Default DoS Action Profile as an Action or you can add a new one using the Pencil icon.
    Image

  4. The following can be set in the Action Profile:
    1. Flood protection: TCP Floods like SYN Flood, RST Floods, UDP Flood, and ICMP Flood protection settings
      Image

    2. DDoS protection
      Image

    3. Attack protection: Spank, Smurf, Land Attack Protection
      Image

    4. Connection Limiting
      Image

    5. Click Save on the Action profile once the desired changes have been made.

  5. The Action on the DoS Policy itself can be Protect or Bypass.
  6. Make sure that the DoS Policy status is enabled and click Add.
    Image

Using the Up/Down arrows in the bottom toolbar of the Policy | Rules and Policies | DoS Policy page, you can change the priority order of the DoS Policies you create directly on the DoS Policy table. Select the checkbox next to the policy you would like to move and click Move to direct it to where you'd like it to go. You can also reposition policies by dragging and dropping.

Image

Related Articles

  • Firewall logs show frequent probe status changes after upgrade
    Read More
  • SSO Agent 4.0: Installation, Configurations, and troubleshooting
    Read More
  • CFS blocks valid sites due to incorrect 64: Not Rated tag
    Read More
not finding your answers?
was this article helpful?