Configuring DoS Rules

You configure DoS rules at the security-policy dos-rules level. For more details on the command structure, see Configuring Rules Using UPL.

To create a DoS protection rule, use the following command:

Admin@nodename# create security-policy dos-rules <position> upl-rule <parameters>

DoS protection rule parameters:

Parameter

Description

PASS

WARNING

DENY

DoS rule action:

  • PASS: allow traffic. DoS protection is not applied.

  • WARNING: apply DoS protection profile.

  • DENY: block traffic unconditionally.

enabled

Enable/disable a rule:

  • enabled(yes) or enabled(true).

  • enabled(no) or enabled(false).

name

Name of the DoS rule.

Example: name("DoS rule example").

desc

A description of the rule.

Example: desc("DoS rule example configured in CLI").

profile

DoS protection profile. You can only select a profile for rules with the Protect action (WARNING). To specify a profile: profile("DoS profile example").

For more details about how to create and configure protection profiles, see Configuring DoS Profiles.

scenario

Scenario that needs to be active for the rule to trigger.

To specify a scenario: scenario = "Example of a scenario".

For more details on configuring scenarios, see Configuring scenarios.

rule_log

Log traffic information if the rule is triggered. The available options are:

  • rule_log(no) or rule_log(false): disable logging. If rule_log is not specified, logging is disabled.

  • rule_log(yes) or rule_log(true): log all network packets without setting any limits. To set a limit, you need to specify the number of events to be logged per time unit (s for second, min for minute, h for hour, and d for day; the minimum log limit is 5 packets per day) and the maximum number of packets logged per event. For example, rule_log(yes, "3/h", 5) enables logging with the following limits: 3 events per hour with a maximum number of packets per event of 5.

  • rule_log(session): log the session start.

src.zone

Traffic source zone.

To specify a source zone, such as Trusted: src.zone = Trusted.

For more details about how to configure zones using CLI, see the Zones section.

src.ip

Add source IP address or domain lists.

To specify a list of IP addresses: src.ip = lib.network(). Provide the list name in parentheses. For more details about how to create and configure IP address lists using CLI, see the Configuring IP addresses section.

To specify a source domain list: src.ip = lib.url(). Provide the URL to which the desired domains were added in parentheses. For more details about how to create and configure URL lists using the CLI, see the Configuring URL Lists section.

src.geoip

Source GeoIP. Specify a country code (for example, src.geoip = AE).

Click here for the list of ISO 3166-1 country codes.

Important! The maximum number of GeoIPs that can be specified is limited to 15.

user

Users and user groups for which the DoS protection rule applies (local or LDAP).

To add LDAP groups and users, you need to have a correctly configured LDAP connector (for more information about configuring LDAP connectors via the CLI, see the Configuring LDAP Connectors section).

Examples of adding users to a rule:

user = known user = "user" user = "testd.local\\user1" user = ("user", "testd.local\\user1")

dst.zone

Traffic destination zone.

To specify a source zone, such as Untrusted: src.zone = Untrusted.

For more details about how to configure zones using CLI, see the Zones section.

dst.ip

Add lists of destination IP addresses or domains.

To specify a list of IP addresses: dst.ip = lib.network(). Provide the list name in parentheses. For more details about how to create and configure IP address lists using CLI, see the Configuring IP addresses section.

To specify a destination domain list: dst.ip = lib.url(). Provide the URL to which the desired domains were added in parentheses. For more details about how to create and configure URL lists using the CLI, see the Configuring URL Lists section.

dst.geoip

To specify a destination GeoIP, it is necessary to specify a country code (for example, dst.geoip = AE).

Click here for the list of ISO 3166-1 country codes.

Important! The maximum number of GeoIPs that can be specified is limited to 15.

service

Service type. You can specify a service or a services group (for more details, see Configuring services and Configuring services groups).

To specify a single service: service = "service name". To specify multiple services: service = (service-name1, service-name2, ...).

To specify a service group: service = lib.service(). Provide the services group name in parentheses.

time

Set a schedule for a rule.

To set a schedule: time = lib.time(). Specify a time set group name in parentheses. For more details on configuring time sets, see Configuring time sets.

To edit a DoS protection rule, use the following command:

Admin@nodename# set security-policy dos-rules <position> upl-rule <parameters>

To view a DoS protection rule, use the following command:

Admin@nodename# show security-policy dos-rules Admin@nodename# show security-policy dos-rules <position>

Example of creating a DoS protection rule using UPL:

Admin@nodename# create security-policy dos-rules 1 upl-rule WARNING \ ...src.zone = Untrusted \ ...dst.zone = DMZ \ ...service = (HTTP, HTTPS) \ ...profile("Test DoS profile") \ ...rule_log(session) \ ...name("Test DoS rule") \ ...desc("Test DoS rule description") \ ...enabled(true) ... Admin@nodename# show security-policy dos-rules 1 % ----------------- 1 ----------------- WARNING \ src.zone = Untrusted \ dst.zone = DMZ \ service = (HTTP, HTTPS) \ desc("Test DoS rule description") \ rule_log(session) \ profile("Test DoS profile") \ enabled(true) \ id("68da2f83-59ae-4a7d-b595-f6ff31bf34c6") \ name("Test DoS rule")

To remove a DoS protection rule, use the following command:

Admin@nodename# delete security-policy dos-rules <position>