Solved

IIS slow attach limits

Posted on 2014-03-03
3
250 Views
Last Modified: 2014-03-07
I have read this:  http://www.iis.net/configreference/system.applicationhost/sites/sitedefaults/limits

What are the limits that are recommended to avoid slow attacks for:

1) connectionTimeout
2) maxBandwidth
3) maxConnections
0
Comment
Question by:amucinobluedot
3 Comments
 
LVL 15

Accepted Solution

by:
pateljitu earned 500 total points
ID: 39901839
You can be a better judge for these default values, reason I am saying this is you would need to monitor your network and calculate average bandwidth, no of connection utilized based on flow of traffic.

For e.g.
10000 request / second [maxConnections] + 100 KB transfer / request = 0.95 GB / sec [maxBandwidth]
(Now this is just an example, if you have average website with static page your bandwidth / page will be 2 - 20KB / request or even smaller than that)

Again these are suggestive values which you will have to make sure on your side based on your website traffic flow.


On DoS topic you can also setup "Dynamic IP Restrictions Extension" which can also help to block Denial of Service Attacks.

http://www.iis.net/downloads/microsoft/dynamic-ip-restrictions
0
 

Author Comment

by:amucinobluedot
ID: 39903486
Thank you .
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question