Configuring TCP attack protection