How can we help?
-
zWAN
-
-
-
-
- Firewall & Layer 7 Application Filtering
- VPN Site-to-Site Tunnel Setup & Connectivity (z40 to Cloud vGR)
- Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Testing
- DNS Filtering
- DDoS Protection & Logging
- MAC Address Filtering & Geo-fencing
- Application Control & Protocol Blocking
- Authentication & Access Control (zID)
-
- WAN Link Failover & Load Balancing (ACI Mode)
- Dynamic Path Selection & Application-Aware Routing
- SaaS & Internet Breakout Validation
- QoS for Microsoft Teams (Datacenter vGR + Branch z40)
- Tunnel Failover (z40 ↔ vGR) — WAN00 (wired) primary, WAN03 (4G) & WAN04 (5G) backups
- IP Routing & Static Route Steering (z40 Branch)
- VLAN & Layer-2 Bridging
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- IPsec Tunnel not Establishing
- SSL-VPN Tunnel not Establishing
- Mobile Network Issues
- Management Tunnel does not Establish
- DNS not Resolving from Local Network Appliance
- DNS Resolution Issues in Tunnel Configuration
- DHCP Server not Leasing IP to LAN PC
- Debugging EC Events - Unknown Status Issue
- Trusted-MAC Geofencing Issues
- DNS Issues from DC LAN PC
- Troubleshooting LAN Connectivity to Internet via WAN, Remote Branch LAN, or Local Branch LAN
- NetBalancer gateways displaying Faulty/Inactive
- Packet Drop Issues
-
-
zTC
-
-
-
-
-
- Citrix HDX + USB Headset (Call-Center Baseline)
- OS/Firmware Update & Rollback
- Power Management and Session State
- Wi-Fi Roaming & Link Change Mid-Session
- Kiosk / Assigned-Access Auto-Launch
- Barcode Scanner (HID) with Line-of-Business App
- Printing to Local USB & Network Printers
- USB Device Management – Block Storage
- Multi-Monitor & 4K Performance
- Microsoft AVD/RDP + Teams Optimized Video
- VMware Horizon + Smart Card / CAC Login
-
-
StorTrends
-
zAccess
-
zGuardian
You are here:
Print
DDoS Protection & Logging
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
Objective
Ensure the zWAN/zGuardian device detects, mitigates, and logs common DDoS attacks (ICMP, UDP, TCP SYN, TCP RST floods, SSH brute force), maintaining service availability.
Prerequisites
- Admin access to zWAN Director UI.
- Device with DDoS enabled and interfaces configured for scanning.
- Test clients available on LAN (Linux and Windows).
- Authorized lab or POC environment for testing.
Test Setup and Configuration
- Log in to zWAN Director UI.
- Navigate to: Edge Controllers > [Device] > Security > DDoS
- Enable the DDoS Protection toggle.
- Click Add Interface, select WAN interface(s), enable scanning, and save.
- Review and adjust threshold values for: ICMP Flood, UDP Flood, TCP SYN Flood, TCP RST Flood, SSH Brute Force.
- Save and apply changes.
ICMP Flood Test
Linux:
Run these commands in your terminal:
- sudo apt-get install hping3
- sudo hping3 –icmp –flood –rand-source <target_ip>
Windows:
Using Nping (included with Nmap):
- nping –icmp –rate 1000 –dest-ip <target_ip>
Note: Adjust <target_ip> to your zWAN device WAN IP.
UDP Flood Test
Linux:
- sudo hping3 –udp –flood –rand-source -p 53 <target_ip>
Windows:
- nping –udp –rate 1000 –dest-ip <target_ip> -p 53
TCP SYN Flood Test
Linux:
- sudo hping3 –syn –flood –rand-source -p 80 <target_ip>
Windows:
- nping –tcp –flags syn –rate 1000 –dest-ip <target_ip> -p 80
TCP RST Flood Test
Linux:
- sudo hping3 –rst –flood –rand-source -p 80 <target_ip>
Windows:
- nping –tcp –flags rst –rate 1000 –dest-ip <target_ip> -p 80
SSH Brute Force Test
Linux (Hydra):
- sudo apt-get install hydra
- hydra -l testuser -P /usr/share/wordlists/rockyou.txt ssh://<target_ip>
Windows (Medusa):
- Download Medusa from https://github.com/jmk-foofus/medusa/releases
- Extract and open Command Prompt in Medusa folder.
- Run: medusa -h <target_ip> -u testuser -P rockyou.txt -M ssh
Validation
- Check Edge Controllers > [Device] > Security > DDoS > Attack and Portscan tabs for blocked IPs.
- Review Edge Controllers > [Device] > System > Logs > SYSLOG > DDoS tab for event details.
- Verify other network services remain operational during tests.
- Confirm attack traffic is blocked or rate-limited.
Safety and Legal Disclaimer
- Perform tests only in authorized lab or POC environments.
- Start tests at low rates and increase cautiously to avoid network impact.
- Notify stakeholders before running tests.
- Stop immediately if unintended disruption occurs.
Was this article helpful?
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
5
Table of Contents