You can configure ACL-based rate limiting for protection against TCP SYN, TCP RST, ping flood, and UDP flood attacks. In the following use cases for these attacks, you configure the ACL that is used to protect against the attack, bind the ACL to an interface, and configure and apply the ACL traffic filtering.