Advanced TCP Protection
Cloudflare’s Advanced TCP Protection, powered by flowtrackd
↗, is a stateful TCP inspection engine used to detect and mitigate sophisticated out-of-state TCP attacks such as randomized and spoofed ACK floods or SYN and SYN-ACK floods.
Advanced TCP Protection can simultaneously protect against different kinds of attacks:
- Pinpointed attacks targeting a specific destination IP/port combination.
- Broad attacks targeting multiple IP addresses of an IP prefix at the same time.
Advanced TCP Protection can track TCP connections even when they move between Cloudflare data centers.
The feature offers two types of protection:
- SYN Flood Protection: Protects against attacks such as fully randomized SYN and SYN-ACK floods.
- Out-of-state TCP Protection: Protects against out-of-state TCP DDoS attacks such as fully randomized ACK floods and RST floods.
Each protection type is configured independently using rules and (optionally) filters. You should configure at least one rule for each type of protection before enabling Advanced TCP Protection.
This system protects against attacks such as fully randomized SYN and SYN-ACK floods. You should configure at least one SYN flood rule before enabling Advanced TCP Protection.
In mitigation mode, SYN flood rules will challenge new connection initiation requests (SYN, SYN-ACK) if they exceed the configured packet-per-second thresholds. The threshold should be higher than the normal rate of legitimate SYN and SYN-ACK packets that your network receives. Packets below the threshold will not be challenged. Using the rate sensitivity and burst sensitivity settings you can increase or decrease the tolerance of SYN and SYN-ACK packets.
For more information on the configuration settings of SYN flood rules, refer to Rule settings.
This system protects against out-of-state TCP DDoS attacks such as fully randomized ACK floods and RST floods. You should configure one out-of-state TCP rule before enabling Advanced TCP Protection.
In mitigation mode, out-of-state TCP rules will drop out-of-state packets that do not belong to existing (and tracked) TCP connections if their rates exceed the configured thresholds. The threshold should be higher than the normal rate of non SYN or SYN-ACK TCP packets that your network receives. Packets below the threshold will not be evaluated. Using the rate sensitivity and burst sensitivity settings you can increase or decrease the tolerance of out-of-state TCP packets.
For more information on the configuration settings of out-of-state TCP rules, refer to Rule settings.
Create a global configuration to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.