How to mitigate DoS and DDoS Attacks towards SMA Appliances

Description

This article explains some of the configuration steps you may take to reduce the impact of DoS and DDoS attacks towards the SMA appliance.

Please note that these types of attacks may vary and this guide is intended to provide just some common steps to reduce the attack surface.

CAUTION: It’s very important that a firewall is placed in front of the SMA appliance and act as a filter for such attacks as recommended in our deployment guides.

 

Image

Resolution

Below a few basic steps to protect SMA using WAF policy/rules.

  • Create Rule Chains:

    Image 

  • Locking AD account by unknown user brute force: Enable the following option on the SMA to only allow the login of the listed user.
    Image
  • Virtual Office Portals: if the attacker is trying to flood with requests on each domain with the same unknown user, we recommend  to hide the domain list on the portal login page, so the attackers cannot fetch the available domains on the appliance therefore reducing the attack surface and success rate

    Image

 

Other possible steps:


If you still have any other behaviors or symptoms, please share more details along with TSR for further review.

There are two ways to contact technical support:

1. Online: Visit mysonicwall.com. Once logged in select Resources & Support | Support | Create Case

2. By phone: please use our toll-free number at 1-888-793-2830. Please have your SonicWall serial number available to create a new support case.

If you do not have a mysonicwall.com account create one for free!

 

Related Articles

  • SMA100 End of Support No-Charge Replacement FAQ
    Read More
  • SMA1000: Post upgrade to 12.5.0 on AWS and Azure, we show the error Could not retrieve the DNS settings once we log in to AMC/CMS console
    Read More
  • Firmware version required to upgrade to version 12.5.0.
    Read More
not finding your answers?