An attacker from IP address 1.1.1.2 is filling your SRX Series device’s session table with TCP sessions that have all completed a legitimate three-way handshake.
What will help throttle the attack?
A.
syn-flood destination-threshold
B.
syn-ack-ack-proxy
C.
limit-session destination-ip-based
D.
limit-session source-ip-based
I have the same idea. D