Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Example: Protecting Against a Teardrop Attack

    This example shows how to protect against a teardrop attack.


    No special configuration beyond device initialization is required before configuring this feature.


    In this example, you enable protection against a teardrop attack and also specify the zone where the attack originates.


    Step-by-Step Procedure

    To enable protection against teardrop attack:

    1. Specify the screen name.
      user@host# set security screen ids-option tear-drop ip tear-drop
    2. Associate the screen with a security zone.
      user@host# set security zones security-zone zone screen tear-drop
    3. If you are done configuring the device, commit the configuration.
      user@host# commit


    To verify the configuration is working properly, enter the show security screen ids-option tear-drop and show security zones commands in operational mode.

    Modified: 2017-11-03