Zone Protection Profiles

Configure protection against floods, reconnaissance, packet-based attacks, and non-IP-protocol-based attacks with Zone Protection profiles.
Apply a Zone Protection profile to each zone to defend it based on the aggregate traffic entering the ingress zone.
In addition to configuring zone protection and DoS protection, apply the best practice Vulnerability Protection profile to each Security policy rule to help defend against DoS attacks.

Recommended For You