Navigation
Table of Contents
Guide That Contains This Content
[+] Expand All
[-] Collapse All
Related Documentation
Example: Protecting Against a Teardrop Attack
This example shows how to protect against a teardrop attack.
Requirements
No special configuration beyond device initialization is required before configuring this feature.
Overview
In this example, you enable protection against a teardrop attack and also specify the zone where the attack originates.
Configuration
Step-by-Step Procedure
To enable protection against teardrop attack:
- Specify the screen name.[edit]user@host# set security screen ids-option tear-drop ip tear-drop
- Associate the screen with a security zone.[edit]user@host# set security zones security-zone zone screen tear-drop
- If you are done configuring the device, commit the configuration.[edit]user@host# commit
Verification
To verify the configuration is working properly, enter the show security screen ids-option tear-drop and show security zones commands in operational mode.