SYN Protection
The network ports might be used by hackers to attack the device in a SYN attack, which consumes TCP resources (buffers) and CPU power.
Since the CPU is protected using SCT, TCP traffic to the CPU is limited. However, if one or more ports are attacked with a high rate of SYN packets, the CPU receives only the attacker packets, thus creating Denial-of-Service.
When using the SYN protection feature, the CPU counts the SYN packets ingressing from each network port to the CPU per second.
To configure SYN protection, follow these steps:
Procedure
Step 1 | Click Security > Denial of Service Prevention > SYN Protection. |
Step 2 | Enter the parameters.
|
Step 3 | Click Apply. SYN protection is defined, and the Running Configuration file is updated. The SYN Protection Interface Table displays the following fields for every port or LAG (as requested by the user).
|