Restrict vpn users from making too many connections too quickly
Posted: Sun Jul 29, 2018 2:22 am
Hi there,
I have a SoftEther VPN server setup on a cloud server that allows users to connect to through L2TP and OpenVPN. The cloud vendor of the VPS warned that from the VPN server they have noticed a lot of requests to a few sites within a very short period of time and they flagged it as DoS attack initiated from the VPN server.
I'm looking for ways to restrict outgoing traffic from our VPN server.
I've looked into iptables rules but wasn't able to find any good rules to restrict outgoing traffic.
Are there any settings on SoftEther server that I can leverage to restrict outgoing traffic (generated by VPN users) that might be, or look like DoS attacks to other servers/websites? Are there any other ways you can kindly recommend so I could hopefully restrict total number of connections, and burst connection within 1 second per source VPN IP/user?
Thank you in advance!
Jim
I have a SoftEther VPN server setup on a cloud server that allows users to connect to through L2TP and OpenVPN. The cloud vendor of the VPS warned that from the VPN server they have noticed a lot of requests to a few sites within a very short period of time and they flagged it as DoS attack initiated from the VPN server.
I'm looking for ways to restrict outgoing traffic from our VPN server.
I've looked into iptables rules but wasn't able to find any good rules to restrict outgoing traffic.
Are there any settings on SoftEther server that I can leverage to restrict outgoing traffic (generated by VPN users) that might be, or look like DoS attacks to other servers/websites? Are there any other ways you can kindly recommend so I could hopefully restrict total number of connections, and burst connection within 1 second per source VPN IP/user?
Thank you in advance!
Jim