Section - DoS Attack Prevention

Specifies the maximum number of requests that are allowed to access this application from the same source IP address within the given period of time (in seconds). Note that the request frequency filter is based on a statistical function that approximates the real request frequency in a very efficient way. Therefore, there exists a small associated variance of the number of requests that are allowed which may be noticed in tests. For productive scenarios, the request frequency filter of Airlock Gateway should give satisfying results.

Limit request frequency

Enables DoS attack prevention feature.

Max requests per interval

Maximum requests allowed per IP address.

Interval (seconds)

Interval for measurement of allowed requests per IP address.

Source IP address whitelist

Reference to an IP List that acts as whitelist. All source IPs matching this list will be excluded from the session limit per IP restriction. This is typically used if you have many users having the same source IP (i.e. proxy).

Source IP address whitelist pattern

Reference to an IP pattern that acts as whitelist. All source IPs matching this pattern will be excluded from the session limit per IP restriction. This is typically used if you have many users having the same source IP (i.e. proxy).