IP fragments might contain an attacker's attempt to exploit the vulnerabilities in the packet reassembly code of specific IP stack implementations.
|
Before You Begin |
|---|
|
For background information, read Understanding IP Packet Fragment Protection. |
You can use either J-Web or the CLI configuration editor to drop fragmented IP packets. The specified security zone is the one from which the fragments originated.
This topic covers: