Is there a way with Sophos UTM 9 to limit the connections per second for web requests? Preferably per requesting IP address.
This thread was automatically locked due to age.
Hi Tim,
Are you looking to restrict source packets per second? Then please go to Network Protection> Intrusion Prevention > AntiDoS/ Flooding. Refer https://community.sophos.com/kb/hu-hu/115154 for further help.
Thanks
Hi Tim,
Are you looking to restrict source packets per second? Then please go to Network Protection> Intrusion Prevention > AntiDoS/ Flooding. Refer https://community.sophos.com/kb/hu-hu/115154 for further help.
Thanks
HI TIm ,
As the KB article provided by Sachin go to section
For sessions per address you may configure the TCP flag . But this may affect the multiple sessions to the same host .
To employ TCP SYN flood protection, enable "Use TCP SYN Flood Protection"
Mode: The following modes are available:
Logging: This option lets you select the log level. The following levels are available:
Note: It is important to enter reasonable values here, for if you set the rate too high, your web server, for instance, might fail because it cannot deal with such an amount of SYN (TCP) packets. On the other hand, if you set the rate too low, your firewall might show some unpredictable behavior by blocking regular SYN (TCP) requests. Reasonable settings for every system heavily depend on your hardware. Therefore, replace the default values by numbers that are appropriate for your system. Click Apply and your settings will be saved.
Taken from article 115154
Note : This may affect downloads and may affect slow browsing and the value should be set by testing on a PC . Background services are also taken into consideration .
Thanks and regards
Aditya Patel | Network and Security Engineer.
It's really about throttling legitimate traffic, like clients that get impatient and repeatedly hit submit. Or as is sometimes the case, when they drop a stack of papers on their keyboard. It can also be when someone is accessing the API and spin up too many processes. Not really looking at intentionally malicious traffic.
In the referenced article it says: "The ASG can protect against flooding by throttling connections that are not following the normal TCP/IP protocols." Later followed with: "On the other hand, if you set the rate too low, your firewall might show some unpredictable behavior by blocking regular SYN (TCP) requests".
So, does it rate limit all TCP connection requests, or is it looking for specific types of malicious traffic?
TMG let me specify HTTP traffic connections per minute and we actually had users who could exceed the limit just filling out forms on websites and clicking next. We tweaked as necessary.