Solved

IIS slow attach limits

Posted on 2014-03-03
3
256 Views
Last Modified: 2014-03-07
I have read this:  http://www.iis.net/configreference/system.applicationhost/sites/sitedefaults/limits

What are the limits that are recommended to avoid slow attacks for:

1) connectionTimeout
2) maxBandwidth
3) maxConnections
0
Comment
Question by:amucinobluedot
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 15

Accepted Solution

by:
pateljitu earned 500 total points
ID: 39901839
You can be a better judge for these default values, reason I am saying this is you would need to monitor your network and calculate average bandwidth, no of connection utilized based on flow of traffic.

For e.g.
10000 request / second [maxConnections] + 100 KB transfer / request = 0.95 GB / sec [maxBandwidth]
(Now this is just an example, if you have average website with static page your bandwidth / page will be 2 - 20KB / request or even smaller than that)

Again these are suggestive values which you will have to make sure on your side based on your website traffic flow.


On DoS topic you can also setup "Dynamic IP Restrictions Extension" which can also help to block Denial of Service Attacks.

http://www.iis.net/downloads/microsoft/dynamic-ip-restrictions
0
 

Author Comment

by:amucinobluedot
ID: 39903486
Thank you .
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question