
Using SmartDefense
You can configure how Teardrop attacks should be handled.
T
In
able 35: Teardrop Fields
this field… Do this…
A
ck occurs, by selecting one
•
Block.
Block the attack. This is the default.
•
None.
No action.
ction
Specify what action to take when a Teardrop atta
of the following:
Track
Specify whether to log Teardrop attacks, by selecting one of the following:
•
Log.
Log the attack. This is the default.
•
None.
Do not log the attack.
Ping of Death
In a Ping of Death attack, the attacker sends a fragmented PING request that
exceeds the maximum IP packet size (64KB). Some operating systems are unable
to handle such requests and crash.
Chapter 9: Setting Your Security Policy
225