Check Point UTM-1 Edge User Manual page 400

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

SmartDefense Categories
LAND
In a LAND attack, the attacker sends a SYN packet, in which the source address and port
are the same as the destination (the victim computer). The victim computer then tries to
reply to itself and either reboots or crashes.
You can configure how LAND attacks should be handled.
Table 70: LAND Fields
In this field...
Do this...
Action
Specify what action to take when a LAND attack occurs, by selecting one of
the following:
Track
Specify whether to log LAND attacks, by selecting one of the following:
386
Block. Block the attack. This is the default.
None. No action.
Log. Log the attack. This is the default.
None. Do not log the attack.
Check Point UTM-1 Edge User Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF