SonicOS 7.1 Objects
- SonicOS 7.1 Action Objects
- About SonicOS
- Match Objects
- Zones
- How Zones Work
- Default Zones
- Security Types
- Allow Interface Trust
- Effect of Wireless Controller Modes
- Zones Overview
- The Zones Page
- Adding a New Zone
- Adding a New Zone in Policy Mode
- Adding a New Zone in Classic Mode
- Configuring a Zone for Guest Access
- Configuring a Zone for Open Authentication and Social Login
- Configuring the WLAN Zone
- Configuring the RADIUS Server
- Configuring DPI-SSL Granular Control per Zone
- Enabling Automatic Redirection to the User-Policy Page
- Cloning a Zone
- Editing a Zone
- Deleting Custom Zones
- Addresses
- Addresses Page
- About UUIDs for Address Objects and Groups
- Working with Dynamic Address Objects
- Services
- URI Lists
- Schedules
- Dynamic Group
- Email Addresses
- Match Objects
- Countries
- Applications
- Web Categories
- Websites
- Match Patterns
- Custom Match
- Profile Objects
- Endpoint Security
- Bandwidth
- QoS Marking
- Content Filter
- DHCP Option
- DNS Filtering
- Block Page
- Anti-Spyware
- Gateway Anti-Virus
- Log and Alerts
- Intrusion Prevention
- AWS
- Action Profiles
- Security Action Profile
- DoS Action Profile
- Action Objects
- App Rule Actions
- Content Filter Actions
- Object viewer
- SonicWall Support
Attack Protection
From the Attack Protection, you can guard the network against remote host attacks, smurf attacks, and a Layer 4 Denial of Service (DoS) attacks.
To configure the Attack Protection of the DoS Action Profile
- Navigate to OBJECT | Action Profiles > DoS Action Profile.
-
Do one of the following:
-
Add a new DoS Action Profile.
- Click the Add icon.
- Enter a friendly DoS Rule Action Name.
-
Edit an existing DoS Action Profile.
Hover over an existing DoS Action Profile and click the Edit icon.
-
-
Click the Attack Protection tab.
-
Enable the Attack Protection options.
Spank Protection To guard against remote host attacks responding to TCP packets that have come from a multicast IP addresses. Attackers exploit this vulnerability by conducting a spank denial of service attack. This results in the host being shut down or the network traffic reaching saturation. Also, this vulnerability can be used by an attacker to conduct stealth port scans against the host. Smurf Protection To guard against attacks where LAN Clients are being used as part of an Amplifier network. Land Attack Protection To protect against a Layer 4 Denial of Service (DoS) attack where the attacker resets the source and destination information of a TCP segment to be the same. A vulnerable machine crashes or freezes because the packet is being repeatedly processed by the TCP stack. - Click Save.
- Click Cancel to go back to the DoS Action Profile page or proceed with other configurations.
Was This Article Helpful?
Help us to improve our support portal