[Contents] [Prev] [Next] [Index] [Report an Error]

Enabling Protection Against a SYN-ACK-ACK Proxy Flood Attack

Malicious users can fill up the firewall session table to the point where the device begins rejecting legitimate connection requests by continuously initiating SYN-ACK-ACK sessions.

Before You Begin

For background information, read Understanding SYN-ACK-ACK Proxy Flood Attacks.

To enable protection against a SYN-ACK-ACK proxy flood, use either J-Web or the CLI configuration editor. The specified zone is where the attack originated.

Note: The value unit is connections per source address. The default value is 512 connections from any single address.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]