H3C Technologies H3C SecPath F1000-E User Manual
Page 642

i
Table of Contents
TCP Proxy Configuration ············································································································································· 1
Overview············································································································································································1
Introduction to SYN Flood Attack ···························································································································1
Introduction to TCP Proxy ········································································································································1
How TCP Proxy Works ············································································································································2
Configuring TCP Proxy ·····················································································································································3
Configuration Task List·············································································································································3
Performing Global TCP Proxy Setting ····················································································································4
Enabling TCP Proxy for a Security Zone················································································································4
Adding a Protected IP Address Entry ·····················································································································4
Displaying Information About Protected IP Address Entries·················································································5
TCP Proxy Configuration Example ··································································································································6
Configuration Guidelines ·················································································································································8