8.10. DoS protection

UserGate supports granular settings to protect networks from network flooding (for TCP (SYN-flood), UDP, ICMP). Preliminary settings can be configured in the zone properties (see section Configuring zones) while more precise settings are available in this section. Using the DoS protection rules, administrators can provide specific settings to protect a given service, protocol or application from DoS attacks. To create DoS protection rules, the administrator must perform the following steps:

Name

Description

Step 1. Create DoS profile

Go to Security policies-->DoS profiles, click Add and create one or more DoS profiles.

Step 2. Create DoS rule

Go to Security policies-->DoS rules, click Add and create one or more DoS rules. Use DoS profiles created on the previous step.

To create a DoS profile, go to Security policies-->DoS profiles, click Add and fill out the following fields:

Name

Description

Name

Name of the profile.

Description

Description of the profile.

Aggregate

This option sets whether UserGate will be summing up packets per second for all IP addresses of the traffic source or counting them individually for each IP address. When this option is active, make sure to specify large values for packets per second on the DoS protection and Resource protection tabs.

DoS protection

Specify the following DoS protection parameters in the zone for the TCP (SYN-flood), UDP and ICMP protocols:

  • Alert threshold - once the number of packets exceeds the specified limit, this event will be recorded in the system log

  • Drop threshold - once the number of packets exceeds the specified limit, UserGate will start dropping packages and will record this event in the system log

Resource protection

This option allows you to limit the maximum number of sessions per protected resource, e.g. published server:

  • On -- enables the limitation for the maximum number of sessions

  • Limit the number of sessions -- sets the maximum allowed number of sessions.

To create a new DoS protection rule, click Security policies-->DoS rules, click Add and specify the following parameters.

Important! Rules are applied from top to bottom in the same order as they are displayed in the console. The system always applies only the first rule for which all criteria are met. This means that the most specific rules must be in the upper part of the list, while the broader rules must be in the bottom. If you want to change the order of rules, use the Up/Down buttons.

Important! The rule will be applied only when all its specific conditions are met. The Negate checkbox makes the condition opposite to the initial condition, i.e. corresponds to logical negation (NOT).

Name

Description

Enabled

Enables or disables a rule

Name

Rule name

Description

Description of a rule

Action

Block -- blocks the traffic without any conditions (similar to firewall rules).

Allow -- allows the traffic flows, but without any DoS protection. This option can be used for creating exclusions.

Protect -- enables protection with the selected DoS profile.

DoS profile

If action is protect, chose one of the created DoS profiles.

Scenarios

It indicates a scenario that must be active for applying the rule. For more details on scenarios, please refer to Scenarios.

Important! A scenario represents an additional condition. If the scenario is not activated (i.e. one or more its triggers are not launched), the rule will not be applied.

Enable logging

Logs information about traffic when a rule is triggered. The following modes can be used:

  • Log session start. Only first packet will be logged for every session. This is recommended setting for logging.

  • Log all packets. Every network packet will be logged. It is recommended to enable logging limit to avoid high system utilization for this mode.

Source

Zone(s) and IP addresses of the traffic source

Users

List of users and groups of users to which this rule will be applied. You can add users of the Any, Unknown, Known type. To apply rules to individual users or user of the Known type, make sure to set up authentication properly. For more details on user identification, please refer to Users and devices.

Destination

A destination zone and/or a list of destination IP addresses for the traffic.

Service

Service type, e.g. HTTP or HTTPS

Time

Time ranges when rule is active.