We are experiencing some flooding on our firewall. Here is what is
happening. We have open source clients accessing an application server
behind our firewall. Because of a bug in the client app, when it can't talk
to the server it floods the firewall with connection attempts. Besides the
syndefender feature, which we've been advised not to use because of its
effect on other session oriented protocols, is there any other method of
detecting and stopping floods from specific addresses. We are using
checkpoint FW-1 4.1 sp2 in a distributed solaris 2.7 environment.
Thanks in advance for your help,
Kristin
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================