Fragment Settings
By default, the threat defense device allows up to 24 fragments per IP packet, and up to 200 fragments awaiting reassembly. You might need to let fragments on your network if you have an application that routinely fragments packets, such as NFS over UDP. However, if you do not have an application that fragments traffic, we recommend that you do not allow fragments by setting Chain to 1. Fragmented packets are often used as Denial of Service (DoS) attacks.
Note | These settings establish the defaults for devices assigned this policy. You can override these settings for specific interfaces on a device by selecting Override Default Fragment Setting in the interface configuration. When you edit an interface, you can find the option on . Select , edit a threat defense device, and select Interfaces to edit interface properties.. |
Procedure
Step 1 | Choose threat defense policy. and create or edit the |
Step 2 | Select Fragment Settings. |
Step 3 | Configure the following options. Click Reset to Defaults if you want to use the default settings.
|
Step 4 | Click Save. You can now go to and deploy the policy to assigned devices. The changes are not active until you deploy them. |