I have an issue where a Netscreen 25 is being flooded with IKE packets from an unrelated source, which at times is overloading the firewall's processing capacity. I see thousands of log entries indicating that the IKE messages are being rejected:
Rejected an IKE packet on ethernet1 from x.x.x.x:500 to y.y.y.y:500 with cookies c423bfd6ca96608b and 0000000000000000 because an initial Phase 1 packet arrived from an unrecognized peer gateway.
Is there a way to filter the control plane of the firewall so that these packets are dropped at the interface edge rather than processed and rejected? This would be done with a simple interface ACL on a Cisco router or ASA, but I'm not sure how to go about this on ScreenOS.