Check Point UTM-1 Edge User Manual page 433

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

IGMP
This category includes the IGMP protocol.
IGMP is used by hosts and routers to dynamically register and discover multicast group
membership. Attacks on the IGMP protocol usually target a vulnerability in the multicast
routing software/hardware used, by sending specially crafted IGMP packets.
You can configure how IGMP attacks should be handled.
Table 93: IGMP Fields
In this field...
Action
Track
Chapter 13: Using SmartDefense
Do this...
Specify what action to take when an IGMP attack occurs, by selecting
one of the following:
Block. Block the attack. This is the default.
None. No action.
Specify whether to log IGMP attacks, by selecting one of the following:
Log. Log the attack. This is the default.
None. Do not log the attack.
SmartDefense Categories
419

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF