Support Center > Search Results > SecureKnowledge Details
DNS response packets are dropped by SmartDefense with 'Response packet too long, potential buffer overflow' message
Symptoms
  • The DNS response packets are dropped by SmartDefense with "Response packet too long, potential buffer overflow" message.

  • Error message from kernel debug (fw ctl debug -m fw + drop):
    "dropped by fw_spii_execute_inspections Reason: spii handler 'dns_verification_code' drop/reject".
Solution
Note: To view this solution you need to Sign In .