TPS Deployment
- Types of DDoS Attacks
- TPS Deployment Modes
- High Availability
DDoS Mitigation
- Protection Layers
- Protected Objects
- Traffic Software Scrubbing Process
- Mitigation Tables
- Black / White Lists
- Using aFlex Scripts
Traffic Rate Limiting
- Defaut Traffic Rate Limits
- Traffic Rate Interval
- Custom Traffic Rate Limits
- Templates
- Precedence of DDoS Settings
- Rate-Limiting by Class-List
- Rate-Limiting by Geo-Location
TPS Mitigation Strategies 1: Volumetric Attacks
- TCP SYN Flood
- TCP SYN Cookie
- TCP Anomalies
- DNS Attacks
- NTP Attacks
TPS Mitigation Strategies 2: Protocol Attacks
- IP Protocol Attacks
- ICMP Protocol Attacks
- TCP Protocol Attacks
- HTTP Protocol Attacks
- SSL Attack Mitigation
TPS Mitigation Strategies 3: Resource Attacks
- Slowloris
- Slow Read Attacks
- SLow Post Attacks
Monitoring & Debugging