[Contents] [Prev] [Next] [Index] [Report an Error]

Enabling Protection Against a Teardrop Attack

Teardrop attacks exploit the reassembly of fragmented IP packets.

Before You Begin

For background information, read Understanding Teardrop Attacks.

You can use either J-Web or the CLI configuration editor to enable protection against a Teardrop attack. The specified zone is where the attack originates.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]