Explanation of F5 DDoS threshold modes
Der Reader, In my article “Concept of Device DOS and DOS profile”, I recommended to use the “Fully Automatic” or “Multiplier” based configuration option for some DOS vectors. In this article I would...
Published Feb 12, 2020
Version 1.0Sven_Mueller
I´m a Security Solution Architect in EMEA, focused on Application and Network-Security.
I act as a liaison between customers, the F5 sales team and the F5 product teams, providing a hands-on real-world perspective.
Before I joined F5, I was a Security Consultant and active on HoneyNet research topics.
I hold a diploma in Electrical Engineering.
Beside my IT Security interests,I love driving on the Nuerburgring (Green Hell).Ret. Employee
Sven_Mueller
I´m a Security Solution Architect in EMEA, focused on Application and Network-Security.
I act as a liaison between customers, the F5 sales team and the F5 product teams, providing a hands-on real-world perspective.
Before I joined F5, I was a Security Consultant and active on HoneyNet research topics.
I hold a diploma in Electrical Engineering.
Beside my IT Security interests,I love driving on the Nuerburgring (Green Hell).Ret. Employee
Darren_Wigley
Employee
Apr 14, 2021Not sure why it took a year to be directed here but this should be required reading for anyone doing DDoS work.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)