(
PAN-OS 8.1.2 and later releases
) Enable the
firewall to generate Threat logs for a teardrop attack and a DoS
attack using ping of death, and also generate Threat logs for the
types of packets listed above if you enable the corresponding packet-based
attack protection (in Step 1). For example, if you enable packet-based
attack protection for
Spoofed IP address
,
using the following CLI causes the firewall to generate a Threat
log when the firewall receives and drops a packet with a spoofed
IP address.