Example: Protecting Against a Teardrop Attack (CLI)
The following example shows you how to enable protection against a teardrop attack. In the example, the specified zone is where the attack originates.
user@host# set security screen ids-option tear-drop ip
tear-dropuser@host# set security zones security-zone zone screen
tear-drop
Related Topics
- JUNOS Software Feature Support Reference for SRX Series and J Series Devices