Dear @PhoneBoy , @the_rock , and @PhoneBoy ,
Thanks for your comments as always. Wonderful you guys are always here to help people.
My apologies for lack of background info. Here's why I am interested in such a good old OS version.
Problems:
No urgent issue occurs. This question was written for begging info, not a solution.
Backgrounds:
Ahead of the replacement of customer's appliances which all run R80.10, with better ones of R82,
I have to investigate any system change made to the system, which might cause connectivity issues.
Their environment has old/original protocol packets, and many of them is likely to be non RFC-compliant.
(I know it is almost impossible to fully presume them all, but I would like to get a picture to some extent.)
What I would like to know:
1. Without IPS blade, can FW blade drop a suspicious packets like listed in Inspection Settings?
2. Apart from behaviour configured in Inspection Settings, is there any function which can drop a packet regardless of firewall policy?
I know in global properties there are the settings associated with a drop of packets like dynamic routing protocol, direct ping, and Ack without Syn.
I am not quite sure where else to check when policy-allowed packet is dropped at the appliance.
It has been very hectic in my office, so my colleagues seemingly do not have time for answering my question.. ;(
My effort alone cannot make them clear to me.
If you give me a pointer, I cannot thank you enough.
Saitoh
sliver bullet: casting repero or tossing it into the harbor