Protect against DoS attacks that try to take down your network and critical devices using a layered approach that defends your network perimeter, zones, and individual devices.
Table of Contents
What Do You Want To Do?
Segment Your Network Using Interfaces and Zones
How Do Zones Protect the Network?
Take Baseline CPS Measurements for Setting Flood Thresholds
DoS Protection Against Flooding of New Sessions
Configure Packet Buffer Protection