TOPIC

LAB

TIME (Hours)

TPS Deployment

Types of DDoS Attacks
TPS Deployment Modes
High Availability

X

1

TPS Mitigation – Static

Protection Layers
Protected Objects
Traffic Software Scrubbing Process
Mitigation Tables
Black/White Lists

X

1

Traffic Rate Limiting

GLIDs
Monitoring Rate Interval
Rate Limiting on Wildcard Port
Bypass Rules
Templates
Precedence of DDoS Settings
Rate-Limiting by Class-List
Rate-Limiting by Geo-Location

X

1.5

TPS Mitigation Strategies I: Volumetric Attacks

TCP SYN Flood
SYN Authentication
TCP SYN Cookie
TCP Anomalies
UDP Attacks
DNS Attacks
NTP Attacks

X

1.5

TPS Mitigation Strategies II: Protocol Attacks

IP Protocol Attacks
ICMP Protocol Attacks
TCP Protocol Attacks
HTTP Protocol Attacks
Regular Expression Filters
Byte Offset Filters
SSL Attacks

X

1

TPS Mitigation Strategies III: Resource Attacks

Slowloris
Slow Read
Slow Post

X

1

TPS Mitigation – Reactive

Zones
Traffic Indicators
Zone Escalation
Zone Templates
Zone Profiles

X

1.5

Monitoring and Debugging

sFlow
Using axdebug
DDoS Packet Capture

X

:30