Explanation of F5 DDoS threshold modes
Der Reader, In my article “Concept of Device DOS and DOS profile”, I recommended to use the “Fully Automatic” or “Multiplier” based configuration option for some DOS vectors. In this article I would...
Published Feb 12, 2020
Version 1.0Sven_Mueller
Employee
I'm a Security Solution Architect in EMEA, focused on Application and Network Security. I act as a liaison between customers, the F5 sales team and the F5 product teams, providing a hands-on real-world perspective. Before I joined F5, I was a Security Consultant and active on HoneyNet research topics. I hold a diploma in Electrical Engineering. Beside my IT Security interests, I'm a Bitcoin enthusiast and love driving on the Nürburgring (Green Hell).Darren_Wigley
Employee
Apr 14, 2021Not sure why it took a year to be directed here but this should be required reading for anyone doing DDoS work.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)