Refer.3.3.3.AskF5 - Manual Chapter - AFM DoS - DDoS Protection
Refer.3.3.3.AskF5 - Manual Chapter - AFM DoS - DDoS Protection
Applies To:
Manual Chapter : AFM DoS/DDoS Protection
Hide Versions Show Versions
BIG-IP AFM
15.0.1, 15.0.0
DoS/DDoS Protection
Monitors and mitigates against denial-of-service and distributed denial-of-service (DoS/DDoS) attacks.
IP Intelligence
Restricts or allows data center access based on lists of source IP addresses (feed lists).
Reporting
Provides detailed graphical reports about network attack events.
AFM DoS/DDoS Protection is designed to protect your data center from attacks by detecting and mitigating a wide
range of malicious traffic patterns and packet types. Malicious traffic patterns and packets are also referred to as
attack vectors or attack signatures.
An effective DoS/DDoS solution blocks attack traffic while allowing legitimate traffic.
https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-system-dos-protection-and-protocol-firewall-implementations/afm-dos-protection.print.html 1/2
1/28/2021 AskF5 | Manual Chapter: AFM DoS/DDoS Protection
An effective DoS/DDoS protection solution requires an in-depth traffic analysis to determine the baseline traffic
patterns and thresholds, as well as attack patterns and thresholds. Once a traffic analysis is complete, you can
determine the appropriate DoS/DDoS attack vectors, and manually configure the detection and mitigation
thresholds for each.
Attack Vectors
BIG-IP AFM uses industry standard Network, DNS and SIP attack vectors, or signatures, that can be configured to
detect and mitigate DoS/DDoS attacks.
Dynamic Signatures
Dynamic signatures are created by AFM DoS/DDoS Protection based on changing traffic patterns over time. When
a unique DoS attack is detected, a dynamic signature is created and can then be used for DoS/DDoS protection.
https://techdocs.f5.com/en-us/bigip-15-0-0/big-ip-system-dos-protection-and-protocol-firewall-implementations/afm-dos-protection.print.html 2/2