Overview
XIMP’s DDoS prevention module analyzes traffic patterns and automatically mitigates volumetric and application-layer attacks before they reach protected workloads. The module operates in two modes: Monitor (detection only) and Mitigate (automatic blocking).Prerequisites
- Administrator credentials with the
adminrole - Network flow collection configured (see Agent Configuration)
- Baseline traffic patterns established (minimum 72 hours of Monitor mode data recommended)
Configuring DDoS Protection Policy
Configure detection settings
| Setting | Description | Recommended |
|---|---|---|
| Detection Mode | Monitor (alerts only) or Mitigate (automatic blocking) | Start with Monitor |
| Threshold — Volumetric | Inbound packet rate (pps) or bandwidth (Mbps) triggering detection | 2× baseline peak |
| Threshold — SYN Flood | New TCP connections/second before SYN-cookie protection activates | 10,000 conn/s |
| Block Duration | How long a detected source is blocked before reassessment | 5 minutes |
| Whitelist | IP ranges exempt from DDoS mitigation | Monitoring systems, partner IPs |
Add whitelist entries
Add IP ranges that should never be blocked regardless of traffic volume:
- XIMP monitoring system IPs (prevent self-blocking)
- Partner or customer IP ranges with legitimate high-volume traffic
- Internal automation systems
Switch to Mitigate mode
After at least 72 hours of Monitor mode with no false positives:
- Review the alert history for any false positive detections
- Add any flagged legitimate sources to the whitelist
- Switch the policy to Mitigate mode
Policy shows Mitigate mode active. Check the DDoS Events feed to confirm no legitimate traffic is being blocked.
Reviewing DDoS Events
- Dashboard
- CLI
Navigate to Monitoring → Security → DDoS Events to review detected and
mitigated attacks:
| Column | Description |
|---|---|
| Time | When the detection occurred |
| Source IP | Originating attack IP or range |
| Type | volumetric, syn-flood, application-layer, or anomaly |
| Peak Rate | Maximum observed attack bandwidth or packet rate |
| Status | Active, Mitigated, or Expired |
| Action Taken | Alert only (Monitor mode) or Blocked (Mitigate mode) |
Handling False Positives
If a legitimate source is incorrectly blocked:Next Steps
Network Monitoring (User Guide)
User-level network traffic analysis for attack investigation
Alert Channels
Configure notification channels for DDoS detection events
Security
Overall XIMP security configuration including access control
Troubleshooting
Diagnose false positive blocks and detection threshold tuning