Prevent TCP Split Handshake Session Establishment
You can configure a TCP Split Handshake Drop in a Zone Protection profile to prevent TCP sessions from being established unless they use the standard three-way handshake. This task assumes that you assigned a security zone for the interface where you want to prevent TCP split handshakes from establishing a session.
- Configure a Zone Protection profile to prevent
TCP sessions that use anything other than a three-way handshake
to establish a session.
- Select NetworkNetwork ProfilesZone Protection and Add a new profile (or select an existing profile).
- If creating a new profile, enter a Name for the profile and an optional Description.
- Select Packet Based Attack ProtectionTCP Drop and select Split Handshake.
- Click OK.
- Apply the profile to one or more security zones.
- Select NetworkZones and select the zone where you want to assign the zone protection profile.
- In the Zone window, from the Zone Protection
Profile list, select the profile you configured in the
previous step.Alternatively, you could start creating a new profile here by clicking Zone Protection Profile, in which case you would continue accordingly.
- Click OK.
- (Optional) Repeat steps 1-3 to apply the profile to additional zones.
- Commit your changes.Click OK and Commit.
TCP Split Handshake Drop
TCP Split Handshake Drop The Split Handshake option in a Zone Protection profile will prevent a TCP session from being established if the session establishment ...
TCP Transmission Control Protocol (TCP) ( RFC 793 ) is one of the main protocols in the Internet Protocol (IP) suite, and is so prevalent ...
TCP Drop To instruct the firewall what to do with certain TCP packets it receives in the zone, specify the following settings. Zone Protection Profile ...
Configure Packet Based Attack Protection
Configure Packet Based Attack Protection To enhance security for a zone, Packet-Based Attack Protection Protect your network against bad IP, TCP, ICMP, IPv6, and ICMPv6 ...
Best Practices for Securing Your Network from Layer 4 and L...
Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions To monitor and protect your network from most Layer 4 and Layer ...
Deploy DoS and Zone Protection Using Best Practices
DoS and Zone Protection deployment best practices help to ensure a smooth rollout that protects your network and your most critical servers. ...
Session Settings and Timeouts
Session Settings and Timeouts This section describes the global settings that affect TCP, UDP, and ICMPv6 sessions, in addition to IPv6, NAT64, NAT oversubscription, jumbo ...
Packet-Based Attack Protection
Protect your network against bad IP, TCP, ICMP, IPv6, and ICMPv6 packets. ...
DoS Protection Profiles
Protect groups of devices and critical individual devices from flood attacks, and limit the maximum concurrent sessions for resources. ...