Malicious users can fill up the firewall session table to the point where the device begins rejecting legitimate connection requests by continuously initiating SYN-ACK-ACK sessions.
|
Before You Begin |
|---|
|
For background information, read Understanding SYN-ACK-ACK Proxy Flood Attacks. |
To enable protection against a SYN-ACK-ACK proxy flood, use either J-Web or the CLI configuration editor. The specified zone is where the attack originated.
![]() |
Note: The value unit is connections per source address. The default value is 512 connections from any single address. |
This topic covers: