1. Palo Alto Networks PAN-OS® Administrator’s Guide 10.2, "DoS Protection." In the section "Packet-Based Attack Protection," the guide details how the firewall protects against flood attacks. It states, "For a SYN flood, the firewall determines that an attack is in progress when the number of SYN packets per second (sps) from a single source or to a single destination exceeds a threshold... The firewall can then use the SYN cookie method to protect itself and the end host." This confirms "SYN flood protection" is the functionality that uses methods like SYN cookies to validate sessions.
2. Palo Alto Networks PAN-OS® Administrator’s Guide 10.2, "Zone Protection Profile." This section describes how to configure flood protection. It lists "SYN Flood" as a specific type of flood to protect against, with configurable thresholds (Alarm Rate, Activate Rate, Max Rate) and actions (SYN Cookies, Random Early Drop). This clearly identifies SYN flood protection as the overarching NGFW functionality.
3. Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 3, Section 3.5.3, the text describes the TCP SYN flood attack. It explains that a defense mechanism is for the gateway router (or firewall) to deploy "SYN cookies," which is a primary technique to thwart this type of DoS attack by validating the client's reachability before allocating resources. This academic source frames SYN cookies as a solution to the problem handled by SYN flood protection functionality.