NGINX App Protect DoS Release 3.0

Here you can find the release information for NGINX App Protect DoS v3.0. NGINX App Protect DoS provides behavioral protection against Denial of Service (DoS) for your web applications.

Release 3.0

September 21, 2022

New Features

  • L4 mitigation (with eBPF)
  • DoS Live Activity Monitoring with requests mitigation graphs
  • DoS Live Activity Monitoring support for multi-instances NGINX App Protect DoS setups (multi-VMs, multi-replicas)

Supported Packages

App Protect DoS

CentOS 7.4+ / RHEL 7.4+ / UBI7
  • app-protect-dos-27+3.0.3-1.el7.ngx.el7.ngx.x86_64.rpm
  • app-protect-dos-27+3.0.3-1.el8.ngx.el8.ngx.x86_64.rpm
Debian 10
  • app-protect-dos_27+3.0.3-1~buster_amd64.deb
Debian 11
  • app-protect-dos_27+3.0.3-1~bullseye_amd64.deb
Ubuntu 18.04
  • app-protect-dos_27+3.0.3-1~bionic_amd64.deb
Ubuntu 20.04
  • app-protect-dos_27+3.0.3-1~focal_amd64.deb
Alpine 3.15
  • app-protect-dos-


  • NGINX Plus R27

Important Notes

  • L4 (eBPF) mitigation helps mitigate volumetric attacks by slowing down the opening of TCP connections by the attackers. It is recommended to deploy NGINX App Protect DoS with L4 (eBPF) mitigation at the perimeter network or behind L3 load balancer. Installing NGINX App Protect DoS with L4 (eBPF) mitigation behind L4/L7 load balancer may result in the load balancer’s starvation during an attack.

  • If NGINX App Protect WAF is installed, app protect should be disabled for the location of DoS Live Activity Monitoring API.

    For example:

    location /api {
    app_protect_enable off;
  • Misconfiguration of app_protect_dos_monitor potentially can cause a false attack declaration. Port configuration should correspond to the port the server listens to.

    For example:

        server {
            listen 8080;
            location / {  app_protect_dos_monitor "";  }
  • proxy_request_buffering off is not supported.

  • gRPC and HTTP/2 protection require active monitoring of the protected service. The directive app_protect_dos_monitor is mandatory for these use cases, otherwise, the attack will not be detected.

  • TLS fingerprint feature is not used in CentOS 7.4 and RHEL 7 / UBI 7 due to the old OpenSSL version. The required OpenSSL version is 1.1.1 or higher.

  • Slow POST attack always mitigates with block action while other types of attacks can also be mitigated with redirection or JS challenges.

  • The recommended option of running NGINX Plus in a Docker Container is with the daemon off flag. It’s mandatory for UBI 8.