Previous Topic: RST-Only SourcesNext Topic: Large DNS Packet Sources


Fragmented Packet Sources

The Fragmented Packet Sources sensor looks for sources of packet fragmentation. Packet fragmentation may indicate poor application delivery or "frag attacks" that can circumvent Access Control Lists (ACLs) and stateless firewalls.

Troubleshooting a Fragmented Packet Sources Alert

An alert from the Fragmented Packet Sources sensor may indicate one of the following issues:

Even though a host who communicates with another host across a VPN tunnel is a legitimate source for fragmented packets, the host is still a source of increased packet load. Adjusting the MTU on the host with the VPN client can help.

CA Anomaly Detector currently cannot actually identify the sources of packet fragmentation. The software can identify only the original source of the IP packet. Any Layer 3 device along the path may be the source of the actual act of fragmenting the packet.