Solved

Teardrop attack

Posted on 2006-10-24
2
1,758 Views
Last Modified: 2008-01-16
Hey guys

 i have netscreen firewall, i had a teardrop attack in my firewall from a selected ip range, can anyone help me how to block this attack or how to block this iprange from outside interface.. any ideas

Thanks for the help

Suresh
0
Comment
Question by:xavier_amala
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Expert Comment

by:prueconsulting
ID: 17803721
Teardrop should not affect a netscreen firewall as its an IP fragment bug exploit for early linux and Windows systems.

0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 500 total points
ID: 17805115
Is it pointed to the firewall itself ? or inside clients/via MIP/VIP ???

If so, a generic policy for some time would be good enough;

set policy id <id> from untrust to trust <Attacker> any any deny log

The above should do it.

Cheers,
Rajesh
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
perimeter firewall HA impact on outages 2 67
Sonicwall NSA failover & LB 4 68
cannot send E-mails to one company 15 146
Advice on setting up a new network for a small business 3 131
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question