Field
|
Type
|
Description
|
UDP_Total_MBPS_Limits
|
String
|
Required. If left empty, the field will be set to empty.
Minimum amount of UDP traffic that needs to be received per second before a DDOS attack is detected. If you’re running a UDP-heavy application, this value would need to be increased (for example, a heavily used VPN server can hit this level easily).
|
ICMP_Total_PPS_Limit
|
String
|
Required. If left empty, the field will be set to empty.
Minimum number of ICMP packets received each second before DDOS filtering is triggered. We do not recommend this limit be set any lower than 10,000.
|
IP_WhiteList_Add
|
String[]
|
Optional.
A list of IP subnets that will be added, as defined in the IP_Whitelist class.
List of IP subnets that will be completely ignored for any DDOS filtering purposes. These subnets will also be whitelisted from any mitigation rules. The largest subnet permitted is a /12 (contact us if you need to add a larger subnet).
|
IP_WhiteList_Remove
|
String[]
|
Optional.
A list of IP subnets that will be removed, as defined in the IP_Whitelist class.
List of IP subnets that will be completely ignored for any DDOS filtering purposes. These subnets will also be whitelisted from any mitigation rules. The largest subnet permitted is a /12 (contact us if you need to add a larger subnet).
|
UDP_Source_Port_Whitelist_Add
|
String[]
|
Optional.
A list if of UDP source ports that will be added, as defined defined in the UDP_Source_Port_Whitelist class.
List of UDP source ports that will be completely ignored for DDOS filtering purposes. These would also be whitelisted from any mitigation rules. Be careful if you add port 53 here, as it would make you vulnerable to any DNS reflection attacks that may come your way.
|
UDP_Source_Port_Whitelist_
Remove
|
String[]
|
Optional.
A list if of UDP source ports that will be removed, as defined defined in the UDP_Source_Port_Whitelist class.
List of UDP source ports that will be completely ignored for DDOS filtering purposes. These would also be whitelisted from any mitigation rules. Be careful if you add port 53 here, as it would make you vulnerable to any DNS reflection attacks that may come your way.
|
Mitigation_Enabled
|
String
|
Required.
True or False.
Tracking of incoming DDOS attacks is done no matter what, but this would allow you to prevent any sort of mitigation from being done.
|
Mitigation_Threshold_MBPS
|
String
|
Required. If left empty, the field will be set to empty.
Minimum size the attack must be before mitigation is started.
|
Mitigation_UDP_Max_MBPS
|
String
|
Required. If left empty, the field will be set to empty.
During mitigation of UDP attacks, any host or source port sending then this amount of data would be blocked. You may need to raise this if you regularly receive large UDP streams.
|
Mitigation_Filtering_Minutes
|
String
|
Required. If left empty, the field will be set to empty.
How long should DDOS mitigation continue, after the attack size drops below the minimum thresholds. This value must be between 2 and 60 minutes.
|
Mitigation_Block_All_UDP
|
String
|
Required.
True or False.
If enabled, all inbound UDP traffic (excluding traffic from whitelisted IPs or ports) will be dropped. This is particularly useful if you are not hosting any UDP based services.
|
TCP_Total_MBPS_Limit
|
String
|
Required. If left empty, the field will be set to empty.
Minimum amount of inbound TCP traffic that needs to be received per second before a DDOS attack is detected.
|
TCP_Perip_Min_Sources
|
String
|
Required. If left empty, the field will be set to empty.
When detecting attacks based on tcp_total_mbps_limit, an attack would only be detected if it were coming from this many unique sources (ip + port combo). Setting this too low will result in normal traffic (like a large download) being detected as an attack.
|
IP_Total_PPS_Limit
|
String
|
Required. If left empty, the field will be set to empty.
Any traffic for IP protocols other than TCP/UDP/ICMP above this limit will be considered an attack (this is total traffic for all unknown protocols, not per-protocol).
|
IP_Total_MBPS_Limit
|
String
|
Required. If left empty, the field will be set to empty.
Any traffic for IP protocols other than TCP/UDP/ICMP above this limit will be considered an attack (this is total traffic for all unknown protocols, not per-protocol).
|
UDP_Dest_Port_Whitelist_Add
|
String[]
|
Optional.
A list of UDP dest ports that will be added, as defined in the UDP_Dest_Port_Whitelist class.
List of UDP destination ports that will be ignored for DDOS filtering purposes. This means that we will never outright block traffic destined to these ports. Traffic may still be blocked by other rules (such as UDP source ports).
|
UDP_Dest_Port_Whitelist_Remove
|
String[]
|
Optional.
A list of UDP destination ports that will be removed, as defined in the UDP_Dest_Port_Whitelist class.
List of UDP destination ports that will be ignored for DDOS filtering purposes. This means that we will never outright block traffic destined to these ports. Traffic may still be blocked by other rules (such as UDP source ports).
|
TCP_Source_Port_Whitelist_Add
|
String[]
|
Optional.
A list of TCP source ports that will be added, as defined in the TCP_Source_Port_Whitelist class.
List of TCP source ports that will be completely ignored for DDOS filtering purposes.
|
TCP_Source_Port_Whitelist_Remove
|
String[]
|
Optional.
A list of TCP source ports that will be removed, as defined in the TCP_Source_Port_Whitelist class.
List of TCP source ports that will be completely ignored for DDOS filtering purposes.
|
TCP_Dest_Port_Whitelist_Add
|
String[]
|
Optional.
A list of TCP destination ports that will be added, as defined in the TCP_Dest_Port_Whitelist class.
List of TCP destination ports that will be ignored for DDOS filtering purposes. This means that we will never outright block traffic destined to these ports. Traffic may still be blocked by other rules (such as TCP source ports).
|
TCP_Dest_Port_Whitelist_Remove
|
String[]
|
Optional.
A list of TCP destination ports that will be removed, as defined in the TCP_Dest_Port_Whitelist class.
List of TCP destination ports that will be ignored for DDOS filtering purposes. This means that we will never outright block traffic destined to these ports. Traffic may still be blocked by other rules (such as TCP source ports).
|
Mitigation_TCP_Max_MBPS
|
String
|
Required. If left empty, the field will be set to empty.
During mitigation of TCP attacks, any host or source port sending more than this amount of data would be blocked.
|
Mitigation_UDP_Total_Max_MBPS
|
String
|
Required. If left empty, the field will be set to empty.
During mitigation of UDP attacks, if a host is receiving more UDP traffic then this (and it can't be filtered any other way), all UDP traffic would be dropped (except for any whitelisted ports).
|