[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Enabling Protection Against a SYN-ACK-ACK Proxy Flood Attack

Malicious users can fill up the firewall session table to the point where the device begins rejecting legitimate connection requests by continuously initiating SYN-ACK-ACK sessions.

Before You Begin

For background information, read Understanding SYN-ACK-ACK Proxy Flood Attacks.

To enable protection against a SYN-ACK-ACK proxy flood, use either J-Web or the CLI configuration editor. The specified zone is where the attack originated.

Note: The value unit is connections per source address. The default value is 512 connections from any single address.

This topic covers:

J-Web Configuration

To configure screens:

  1. Select Configure>CLI Tools>Point and Click CLI.
  2. Next to Security, click Configure or Edit.
  3. Next to Screen, click Configure.
  4. Next to Ids option, click Add new entry.
  5. In the Name box, type 1000-syn-ack-ack-proxy.
  6. Next to Tcp, click Configure.
  7. Next to Syn ack ack proxy box, select the check box and click Configure.
  8. In the Threshold box, type 1000 and click OK.
  9. To save and commit the configuration, click Commit.

To configure zones:

  1. Select Configure>CLI Tools>Point and Click CLI.
  2. Next to Security, click Configure or Edit.
  3. Next to Zones, click Configure.
  4. Next to Security zone, click Add new entry.
  5. In the Name box, type zone.
  6. In the Screen box, type 1000-syn-ack-ack-proxy and click OK.
  7. To save and commit the configuration, click Commit.

CLI Configuration

user@host# set security screen ids-option 1000-syn-ack-ack-proxy tcp syn-ack-ack-proxy threshold 1000
user@host# set security zones security-zone zone screen 1000-syn-ack-ack-proxy

Related Topics


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]