User's Manual Part 2

Using SmartDefense
Chapter 9: Setting Your Security Policy 227
You can configure how Teardrop attacks should be handled.
Table 35: Teardrop Fields
In this field… Do this…
Action Specify what action to take when a Teardrop attack occurs, by selecting one
of the following:
Block. Block the attack. This is the default.
None. No action.
Track Specify whether to log Teardrop attacks, by selecting one of the following:
Log. Log the attack. This is the default.
None. Do not log the attack.
Ping of Death
In a Ping of Death attack, the attacker sends a fragmented PING request that
exceeds the maximum IP packet size (64KB). Some operating systems are unable
to handle such requests and crash.