Information
Flood attacks try to overwhelm the target device in an attempt to consume all system resources. Common flood attacks have been successful using ICMP and TCP SYN packets, but flood attacks using other packet types are definitely possible. This section applies policers to protocols that are commonly used in flooding attacks.
Solution
Configure the firewall to protect against SYN flood attacks.
user@host# edit firewall family inet filter <NAME>
user@host# set term synflood-protect then policer <POLICER_NAME>