DNS response packets are dropped by SmartDefense with 'Response packet too long, potential buffer overflow' message
||IPS / Web Intelligence
- The DNS response packets are dropped by SmartDefense with "Response packet too long, potential buffer overflow" message.
- Error message from kernel debug (fw ctl debug -m fw + drop):
"dropped by fw_spii_execute_inspections Reason: spii handler 'dns_verification_code' drop/reject".
Note: To view this solution you need to