SmartDefense Categories
276
Nokia IP60 Security Appliance User Guide
Teardrop
In a Teardrop attack, the attacker sends two IP fragments, the latter entirely contained within the former.
This causes some computers to allocate too much memory and crash.
You can configure how Teardrop attacks should be handled.
Table 56: Teardrop Fields
In this field…
Do this…
Action
Specify what action to take when a Teardrop attack occurs, by selecting one
of the following:
Block.
Block the attack. This is the default.
None.
No action.
Track
Specify whether to log Teardrop attacks, by selecting one of the following:
Log.
Log the attack. This is the default.
None.
Do not log the attack.
Summary of Contents for IP60 - Security Appliance
Page 1: ...Part No N450000643 Rev 001 Published February 2008 Nokia IP60 Security Appliance User Guide ...
Page 4: ...4 Nokia IP60 Security Appliance User Guide ...
Page 10: ......
Page 12: ......
Page 38: ......
Page 58: ......
Page 108: ......
Page 268: ......
Page 482: ......