Configure protection against floods, reconnaissance,
packet-based attacks, and non-IP-protocol-based attacks with Zone
Protection profiles.
Apply a Zone Protection profile to each zone to defend it
based on the aggregate traffic entering the ingress zone.
In addition to configuring zone protection
and DoS protection, apply the best practice Vulnerability Protection
profile to each Security policy rule to help defend against
DoS attacks.