Operation Manual – IP Addressing and Performance
H3C S3610&S5510 Series Ethernet Switches
Chapter 2 IP Performance Configuration
2-5
Note:
z
If the MD5 authentication is enabled, the SYN Cookie feature will not function. After
the MD5 authentication is disabled, the configured SYN Cookie feature will be
enabled automatically.
z
With the SYN Cookie feature enabled, only the MSS, instead of the window’s zoom
factor and timestamp, is negotiated during TCP connection establishment.
2.3.2 Enabling Protection Against Naptha Attack
Naptha attacks are similar to the SYN Flood attacks. Attackers can perform Naptha
attacks by using the six TCP connection states (CLOSING, ESTABLISHED,
FIN_WAIT_1, FIN_WAIT_2, LAST_ACK, and SYN_RECEIVED), and SYN Flood
attacks by using only the SYN_RECEIVED state.
Naptha attackers control a huge amount of hosts to establish TCP connections with the
server, keep these connections in the same state (any of the six), and request for no
data so as to exhaust the memory resource of the server. As a result, the server cannot
process normal services.
The protection against Naptha attack reduces the risk of the server being attacked by
accelerating the aging of TCP connections in a state. After the protection against
Naptha attack is enabled, the device periodically checks the number of TCP
connections in each state. If it detects that the number of TCP connections in a state
exceeds the maximum number, it will accelerate the aging of TCP connections in such
a state.
Follow these steps to enable the protection against Naptha attack:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enable the protection
against Naptha attack
tcp anti-naptha enable
Required
Disabled by default.
Configure the maximum
of TCP connections in a
state
tcp state
{
closing
|
established
|
fin-wait-1
|
fin-wait-2
|
last-ack
|
syn-received
}
connection-number
number
Optional
5 by default.
If the maximum number of
TCP connections in a state
is 0, the aging of TCP
connections in this state will
not be accelerated.
Configure the TCP state
check interval
tcp timer check-state
timer-value
Optional
30 seconds by default.