UDP flooding occurs when an attacker sends IP packets containing UDP datagrams with the purpose of slowing down the victim to the point that the victim can no longer handle valid connections.
Before You Begin |
---|
For background information, read Understanding UDP Flood Attacks. |
You can use either J-Web or the CLI configuration editor to enable UDP flood protection. The specified zone is where a flood might originate.
![]() |
Note: The value unit is UDP packets per second. The default value is 1000 packets per second. |
This topic covers:
To configure zones:
To configure screens:
- user@host# set security zones security-zone
external screen external-udp-flood
- user@host# set security screen ids-option
1000-udp-flood udp flood threshold 1000