Hi @JiaMIn,
This applies to configuration of DOS/Rate Limiting for R80.20 and newer. Rate limiting is a defense against DoS (Denial of Service) attacks. This links describes the DoS/Rate Limiting system as implemented in R80.20 and newer, including the following features:
- Policy Rules
- IP Blacklist
- Block IP Fragments
- Block IP Options
- Penalty Box
- DoS Whitelist
- Penalty Box Whitelist
In general, these features solve separate problems, and are managed/configured separately. However be aware that there are some global settings that will affect the behavior of multiple features simultaneously.
To maximize performance, the DoS/Rate Limiting policy is enforced as early as possible in the packet flow. For most features this means it is enforced in SecureXL. Connection-based policy is the single exception (R80.20 and newer). This policy is enforced by the Firewall blade since this is where the related connection state is stored and managed.
How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer). More read here:
sk112454 - How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer)
How to configure Rate Limiting rules for DoS Mitigation (R80.10 and older). More read here:
sk164472 - How to configure Rate Limiting rules for DoS Mitigation (R80.10 and older)
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips