The ipv6-tcpsyn-flood enable command enables defense against IPv6 TCP SYN flooding attacks.
The undo ipv6-tcpsyn-flood enable command disables defense against IPv6 TCP SYN flooding attacks.
By default, defense against IPv6 TCP SYN flooding attacks is enabled.
Usage Scenario
A IPv6 TCP SYN flooding attack is a form of Denial of Service (DOS) attack. It sends a large quantity of illegal IPv6 TCP SYN packets to the server. These packets keep the server so busy that it is unable to answer other clients' requests and finally crashes because of being overburdened.
The Device performs the CAR on IPv6 TCP SYN packets that match the set ACLs. This effectively suppresses malicious TCP connection requests. In addition, the aging time for IPv6 TCP SYN packets is set. Currently, the default aging time of IPv6 TCY SYN packets is 75 seconds. In fact, the time can be set from 2 to 600 seconds. You are advised to set the aging time to 2 to 5 seconds when the device is under attacks.In VS mode, this command is supported only by the admin VS.