Solved

Teardrop attack

Posted on 2006-10-24
2
1,766 Views
Last Modified: 2008-01-16
Hey guys

 i have netscreen firewall, i had a teardrop attack in my firewall from a selected ip range, can anyone help me how to block this attack or how to block this iprange from outside interface.. any ideas

Thanks for the help

Suresh
0
Comment
Question by:xavier_amala
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Expert Comment

by:prueconsulting
ID: 17803721
Teardrop should not affect a netscreen firewall as its an IP fragment bug exploit for early linux and Windows systems.

0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 500 total points
ID: 17805115
Is it pointed to the firewall itself ? or inside clients/via MIP/VIP ???

If so, a generic policy for some time would be good enough;

set policy id <id> from untrust to trust <Attacker> any any deny log

The above should do it.

Cheers,
Rajesh
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question