TCP Settings
Overview
Last updated
Was this helpful?
Overview
Last updated
Was this helpful?
In DDoS connection, you can configure Connection based protocols which will regulate the payload length, number of inbound & outbound connections, out of order drops, TCP ports, FIN time wait, TCP connection Proxy threshold & advertised MSS.
Stack > Resource > DDoS > Profile > Connection
Configure the settings
Click on Save Changes
TCP
Boolean
False
Max Inbound concurrent connections
Integer
1000000
Max Outbound concurrent connections
Integer
1000000
Max Connections Per Source
Integer
0
Out of order drops
Integer
False
Window size validation
Boolean
False
PIayload Length Misbehaviour Threshold
Integer
0
Minimum payload length
Integer
0
Allow beyond max connections
Boolean
False
Limit Tracking Connections on Ports
Integer
Blank
Connection FIN Time Wait
Integer
10
Connection proxy
Boolean
False
Connection proxy trigger threshold
Integer
0
Connection proxy advertised MSS
Integer
1460
Enable/Disable validation checks for IPv4/ IPv6 packets
Specify the threshold limit for misbehaviour. IP address breaching the threshold is temporarily blacklisted
Specify minimum payload length of packets in TCP connection
Specify if new TCP flows should be allowed beyond the max
Note:- If Enabled, the new flows beyond the limit will not be tracked
Sets the maximum inbound concurrent TCP connections to allow
Sets the maximum outbound concurrent TCP connections to allow
Specify the max concurrent connections from a single source IP address
Specify if system should drop TCP packets not belonging to a TCP flow
Specify if system should drop invalid window size header in TCP flow
Specify the time till which Connection mitigations trigger will wait before starting mitigation on startup (in seconds)
Specify TCP port(s) that will be tracked for flow monitoring
This field specifies the time duration for tracking TCP connections after graceful termination. This allows any unsent packets to be transmitted without getting dropped
Enable TCP connection proxy for protecting against TCP Flood attacks such as TCP SYN Flood, etc
Specify the number of concurrent flows beyond with Connection Proxy should be enabled for subsequent concurrent TCP flows
Note: Applicable only when Connection Proxy is enabled
Specify the connection proxy advertised MSS
Aging Enabled
Boolean
False
Connection Timeout
Integer
30
Incomplete Connection Timeout
Integer
30
Enable Aggressive Aging for protecting against TCP Connection flood attacks
Time after which the established inbound TCP connection will be considered stale and will be scheduled for deletion
Specify the half open TCP connection timeout