R3166-R3206-HP High-End Firewalls Attack Protection Configuration Guide-6PW101
26
• Type 20.0.0.10 in the Protected IP Address text box.
• Select any from the port list.
• Click Apply.
# Configure the SYN flood detection feature, specifying to automatically add protected IP address
entries.
• Select Intrusion Detection > Traffic Abnormality > SYN Flood from the navigation tree.
• Select Trust from the Security Zone drop-down list.
• Select the Add protected IP entry to TCP Proxy check box in the Attack Prevention Policy area.
• Click Apply.
• In the SYN Flood Configuration area, click Add.
• Select Global Configuration of Security Zone.
• Use the default values for the connection rate threshold and half connection count threshold.
• Click Apply.
Configuration guidelines
Follow these guidelines when configuring TCP proxy:
1. TCP proxy is effective only for incoming traffic of the security zone.
2. The performance of the Web-based management system may be degraded if the system’s IP
address and port number are in the protected IP entry list.