<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DDOS defense in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76801#M15616</link>
    <description>&lt;P&gt;Further to &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;excellent suggestions it's also helpful to do the basics at the network edge like routing unused public networks to null and applying infrastructure ACLs assuming you have an upstream border router(s).&lt;/P&gt;</description>
    <pubDate>Sun, 01 Mar 2020 00:32:57 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2020-03-01T00:32:57Z</dc:date>
    <item>
      <title>DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76796#M15613</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know how to defend the gateway of R80.30 from DDOS and whether the threshold of DDOS protocol can be defined.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks &amp;amp; Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 23:27:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76796#M15613</guid>
      <dc:creator>JiaMIn</dc:creator>
      <dc:date>2020-02-29T23:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76798#M15615</link>
      <description>We have a Best Practice SK on this topic: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241&lt;/A&gt;&lt;BR /&gt;We also sell appliances/services that specifically help with DDoS: &lt;A href="https://www.checkpoint.com/products/ddos-protector/" target="_blank"&gt;https://www.checkpoint.com/products/ddos-protector/&lt;/A&gt;</description>
      <pubDate>Sun, 01 Mar 2020 00:11:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76798#M15615</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-01T00:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76801#M15616</link>
      <description>&lt;P&gt;Further to &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;excellent suggestions it's also helpful to do the basics at the network edge like routing unused public networks to null and applying infrastructure ACLs assuming you have an upstream border router(s).&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2020 00:32:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76801#M15616</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-03-01T00:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76812#M15617</link>
      <description>&lt;P&gt;&lt;SPAN&gt;sk112241&amp;nbsp; &amp;nbsp;Best Practices - DDoS attacks on Check Point Security Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This will auto close secureXL&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2020 10:49:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76812#M15617</guid>
      <dc:creator>Jeff_Gao</dc:creator>
      <dc:date>2020-03-01T10:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76888#M15631</link>
      <description />
      <pubDate>Mon, 02 Mar 2020 17:26:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76888#M15631</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-03-02T17:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76891#M15633</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/42433"&gt;@JiaMIn&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This applies to configuration of DOS/Rate Limiting for R80.20 and newer. Rate limiting is a defense against DoS (Denial of Service) attacks. This links describes the DoS/Rate Limiting system as implemented in R80.20 and newer, including the following features:&lt;/P&gt;
&lt;P&gt;- Policy Rules&lt;BR /&gt;- IP Blacklist&lt;BR /&gt;- Block IP Fragments&lt;BR /&gt;- Block IP Options&lt;BR /&gt;- Penalty Box&lt;BR /&gt;- DoS Whitelist&lt;BR /&gt;- Penalty Box Whitelist&lt;/P&gt;
&lt;P&gt;In general, these features solve separate problems, and are managed/configured separately. However be aware that there are some global settings that will affect the behavior of multiple features simultaneously.&lt;/P&gt;
&lt;P&gt;To maximize performance, the DoS/Rate Limiting policy is enforced as early as possible in the packet flow. For most features this means it is enforced in SecureXL. Connection-based policy is the single exception (R80.20 and newer). This policy is enforced by the Firewall blade since this is where the related connection state is stored and managed.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer). More read here:&lt;/P&gt;
&lt;P&gt;&lt;A href="http:// https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454" target="_self"&gt; sk112454 - How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer) &lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to configure Rate Limiting rules for DoS Mitigation (R80.10 and older). More read here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164472" target="_self"&gt;sk164472 - How to configure Rate Limiting rules for DoS Mitigation (R80.10 and older)&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 17:31:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/76891#M15633</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-03-02T17:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/206147#M34197</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for these links, they are looking promissing. One additional question, maybe it is documented somewhere, but I could not find it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let´s assume the following rate limiting rule for the documentation is going to be implemented.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;fwaccel dos rate add source cidr:192.168.2.0/24 pkt-rate 1000&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;There is one client in this network which is a privileged user and should be able to use the resources more frequently. In case the following rule is added.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;fwaccel dos rate add source cidr:192.168.2.100/32 pkt-rate 1000&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Will there be a conflict with the rules, will one rule overwrite the other, is there a longest-prefix matching? How could such an use case be realized?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanking you in advance&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 05:54:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DDOS-defense/m-p/206147#M34197</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2024-02-15T05:54:59Z</dc:date>
    </item>
  </channel>
</rss>

