Teardrop attacks exploit the reassembly of fragmented IP packets.
|
Before You Begin |
|---|
|
For background information, read Understanding Teardrop Attacks. |
You can use either J-Web or the CLI configuration editor to enable protection against a Teardrop attack. The specified zone is where the attack originates.
This topic covers: