|Use the log filter to determine if the source of the connection is legitimate or the result of a flood attack. To do this, in the console tree of ISA Server Management click Monitoring, then click the Logging tab. Then edit the log filter to view the relevant details. If the connection should be allowed, increase the connection limit threshold. in the console tree of ISA Server Management click Configuration, then click General. In the General details pane, click Define Connection Limits. Use the options in the Connection Limits tab to increase the number of connctions allowed per second.