It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Web Application Firewall

How can I prevent session-based Denial of Service (DoS) attacks with the Barracuda Web Application Firewall?

  • Type: Knowledgebase
  • Date changed: 2 years ago

Solution #00005881


This solution applies to the Barracuda Web Application Firewall, all firmware versions.

Session tracking will enable the Barracuda Web Application Firewall to limit the number of sessions originating from a particular client IP address in a given interval of time. Limiting the session generation rate by client IP helps prevent session-based Denial of Service (DoS) attacks.

To configure Session tracking you need to go to Websites > Advanced Security > Session Tracking and click on 'Edit' for the service to which we need to enable Session tracking.

New Session Count - Specifies the maximum number of new sessions allowed per IP address in a given time interval (specified below).
Range: 1 - 65535
Default: 10

Interval - Specifies a time window in seconds. Within this time period, the same client will not be allowed to establish more sessions than that specified in the 'New Session Count' parameter above.
Range: 1 - 6000 seconds
Default: 60

Status - Set this parameter to On to activate session tracking to limit the requests originating from a particular client IP address in a given interval of time for this service..
Default: Off

Session Identifiers - Select the token type which is used to recognize sessions.

Exception Clients: Specify the IP addresses that should be exempted (not locked out). You can enter a single, or a range of IP addresses, or a combination of both with comma (,) as a delimiter. The range of IP addresses must be separated with a hyphen (-). This makes an exception list of client IPs (permitted users). This list should not have any overlapping IP ranges.
Values: Suitable IP Range

Link to this page: