You can configure how Teardrop attacks should be handled.
T
able 35: Teardrop Fields
In
this field...
Do this...
A
ction
Specify what action to take when a Teardrop atta
of the following:
•
•
Track
Specify whether to log Teardrop attacks, by selecting one of the following:
•
•
Ping of Death
In a Ping of Death attack, the attacker sends a fragmented PING request that
exceeds the maximum IP packet size (64KB). Some operating systems are unable
to handle such requests and crash.
Chapter 9: Setting Your Security Policy
Block. Block the attack. This is the default.
None. No action.
Log. Log the attack. This is the default.
None. Do not log the attack.
Using SmartDefense
ck occurs, by selecting one
225