Cyberoam Protects Against TCP Split Handshake Attack

Woburn MA, (PresseBox) - The NSS Labs report bringing out a "hole" in 5 out of 6 network firewall heavyweights is creating a lot of noise in the IT security market these days. NSS Labs tested firewalls of Check Point Power-1 11065, the Cisco ASA 5585-40, the Fortinet Fortigate 3950, the Juniper SRX 5800, the Palo Alto Networks PA-4020 and the SonicWall NSA E8500. Save Check Point, all other firewalls were found to be vulnerable to the "TCP Split Handshake Attack" that lets a hacker remotely fool the firewall into thinking an IP connection is a trusted one behind the firewall. Click here to read more

While some vendors hit back saying their firewall provided protection against the TCP Split Handshake Attack when used along with their IPS and Anti-Virus modules, few others challenged the NSS test results by saying their firewalls were capable of defending this attack but only after the user enabled the required settings.

Cyberoam's Version 10 firmware-based Firewall offers protection against the TCP Split Handshake Attack without any additional configuration or subscription required at the user's end. Cyberoam's Stateful Inspection engine blocks TCP Split Handshake spoof attacks by default. The Stateful Inspection engine considers such traffic as an "Invalid Traffic" and spoofed packets are dropped even before they enter the network at the perimeter. Administrators can monitor the dropped packets from the CLI using "drop-packet-capture" tool.

Press releases you might also be interested in

Subscribe for news

The subscribtion service of the PresseBox informs you about press information of a certain topic by your choice at a choosen time. Please enter your email address to receive the email with the press releases.

An error occurred!

Thank you! You will receive a confirmation email within a few minutes.


I want to subscribe to the gratis press mail and have read and accepted the conditions.