This document discusses practical steps to mitigate distributed denial of service (DDoS) attacks and provides recommendations for Juniper firewalls. It describes common types of DDoS attacks and factors that improve them. It then lists recommendations for identifying risks and testing networks, and provides examples of configuration settings for Juniper firewalls to limit sessions, age connections, blacklist traffic, prioritize critical traffic, and protect against SYN floods, ICMP floods and other attack types. It also discusses techniques like SYN cookies and hardware acceleration that can help mitigate the impact of DDoS attacks.