jnxJsScreenMonTearDrop 1.3.6.1.4.1.2636.3.39.1.8.1.1.1.1.4

Teardrop attacks exploit the reassembly of fragmented IP packets. In the IP header, one of the fields is the fragment offset field, which indicates one of the fields is the fragment offset field. It indicates the starting position of the data contained in a fragmented packet relative to the data of the original unfragmented packet. When the sum of the offset and size of one fragmented packet differ from that of the next fragmented packet, the packets overlap. The server attempting to reassemble the packet can crash, especially if it is running an older operating system that has this vulnerability. When this option is enabled, the security device detects this discrepancy in a fragmented packet and drops it and this attribute counts the number of packets dropped.

Informations

Access Type
readonly

Parent

1.3.6.1.4.1.2636.3.39.1.8.1.1.1.1 jnxJsScreenMonEntry