Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

References

  1. "Access Control Lists and IP Fragments." Cisco Systems, Inc. http://www.cisco.com/warp/public/105/acl_wp.html. December 2001.

  2. "Access Control Lists and IP Fragments." Cisco Systems, Inc. http://www.cisco.com/warp/public/105/acl_wp.html. December 2001.

  3. FC 1858 "Security Considerations for IP Fragment Filtering." http://www.ietf.org/rfc/rfc1858.txt. October 1995.

  • + Share This
  • 🔖 Save To Your Account