Thanks Jeff for the response.
I was asking about the scenario in which a networking device, specifically a router running Suricata, is positioned between host1 and host2.
If Suricata maintains the state of a TCP session, can it mitigate all TCP session attacks, such as TCP RST attacks and strict TCP handshake issues?
Are there any predefined rules available to mitigate these attacks?
Thanks in advance.