Security-Suite Deny Fragmented - Cisco Small Business 300 1.1 Series Administration Manual

Managed switch
Table of Contents

Advertisement

Quality of Service (QoS) Commands
78-20269-01 Command Line Interface Reference Guide

41.49 security-suite deny fragmented

Use the security-suite deny fragmented Interface Configuration (Ethernet,
Port-channel) mode command to discard IP fragmented packets from a specific
interface.
Use the no form of this command to permit IP fragmented packets.
Syntax
security-suite deny fragmented
[remove {ip-address | any} {mask | /prefix-length}]}
no security-suite deny fragmented
Parameters
ip-address | any—Specifies the destination IP address. Use any to specify
all IP addresses.
mask—Specifies the network mask of the IP address.
prefix-length—Specifies the number of bits that comprise the IP address
prefix. The prefix length must be preceded by a forward slash (/).
Default Configuration
Fragmented packets are allowed from all interfaces.
If mask is unspecified, the default is 255.255.255.255.
If prefix-length is unspecified, the default is 32.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
For this command to work,
and for interfaces.
Example
The following example attempts to discard IP fragmented packets from an
interface.
{[add {ip-address | any} {mask | /prefix-length}] |
security-suite enable
must be enabled both globally
41
609

Advertisement

Table of Contents
loading

Table of Contents