8
Setting Up the Nokia IP45 Security Platform Security Policy
176
Nokia IP45 Security Platform User’s Guide v4.0
You can set the SynDefender by using the command-line interface. For more information about 
SynDefender commands, see the 
Nokia IP45 Security Platform CLI Reference Guide Version 
4.0. 
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to an 
attack. This is most commonly done by attempting to access a port and waiting for a response. 
The response indicates whether or not the port is open.
Table 42 
TCP - fields for SynDefender
Field
Action
Action
Choose the action to be taken when a packet is smaller than the 
Minimal MTU Size threshold.
Options:
•
Block: blocks the packet 
•
None: no action is required
Default value: None
Track
Specify whether to issue logs for packets that are smaller than the 
Minimal MTU Size threshold.
Options:
•
Log: issues logs
•
None: does not issue logs
Default value: Log
Log Mode
When more than 5 incomplete TCP handshakes are detected 
within 10 seconds, an attack is made. We can set the mode 
whether to log per attack or for each unfinished handshake.
Options:
•
Log per attack: logs every attack
•
Log each unfinished handshakes: logs each unfinished 
handshake
•
None:does not log
Maximum 
Time for 
Completing 
the 
Handshake
Allows to fine tune the amount of time (in seconds) after which a 
TCP handshake is considered incomplete.
Protect 
external 
interfaces only
Specifies whether SynDefender should be enabled for all the 
firewall interfaces, or for external (WAN) interfaces only.