jnxJsScreenMonTearDrop
1.3.6.1.4.1.2636.3.39.1.8.1.1.1.1.4
Teardrop attacks exploit the reassembly of fragmented IP
packets. In the IP header, one of the fields is the fragment
offset field, which indicates one of the fields is the fragment
offset field. It indicates the starting position of the data
contained in a fragmented packet relative to the data of the
original unfragmented packet. When the sum of the offset and
size of one fragmented packet differ from that of the next
fragmented packet, the packets overlap. The server attempting
to reassemble the packet can crash, especially if it is running
an older operating system that has this vulnerability.
When this option is enabled, the security device detects this
discrepancy in a fragmented packet and drops it and this
attribute counts the number of packets dropped.