HP VPN Firewall Appliances Attack Protection Command Reference

55
Use undo tcp anti-naptha enable to disable the protection against Naptha attack.
Syntax
tcp anti-naptha enable
undo tcp anti-naptha enable
Default
The protection against Naptha attack is disabled.
Views
System view
Default command level
2: System level
Usage guidelines
The configurations made by using the tcp state and tcp timer check-state commands are removed after
the protection against Naptha attack is disabled.
Examples
# Enable the protection against Naptha attack.
<Sysname> system-view
[Sysname] tcp anti-naptha enable
tcp state
Use tcp state to configure the maximum number of TCP connections in a state. When this number is
exceeded, the aging of TCP connections in this state is accelerated.
Use undo tcp state to restore the default.
Syntax
tcp state { closing | established | fin-wait-1 | fin-wait-2 | last-ack | syn-received } connection-number
number
undo tcp state { closing | established | fin-wait-1 | fin-wait-2 | last-ack | syn-received }
connection-number
Default
The maximum number of TCP connections in each state is 5.
Views
System view
Default command level
2: System level
Parameters
closing: Specifies the CLOSING state of a TCP connection.
established: Specifies the ESTABLISHED state of a TCP connection.
fin-wait-1: Specifies the FIN_WAIT_1 state of a TCP connection.
fin-wait-2: Specifies the FIN_WAIT_2 state of a TCP connection.