North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Access Lists

  • From: Martin, Christian
  • Date: Wed Mar 25 20:07:54 1998

That is what I am going to do.  But with over 100 downstream customers,
and IOS 11.1 (sans named access lists) I don't want to start a


On Wed, 25 Mar 1998, Jain Depak Wrote

Why not just filter all ping traffic to his T1 until the attack


On Wed, 25 Mar 1998, Martin, Christian wrote:

> Hello All,
> I have a customer who is being ping-flooded.  His bandwidth is being
> sucked up due to these floods, and wishes me to block them on my router.
>  I am somewhat reluctant to do this, since it goes against our policy;
> however, the customer has been very patient with us on this issue and
> his patience is running out.  
> I would be implementing on a Cisco 7507, with 3 T-3s to the Internet,
> and the customer hangs off the router on a T-1.  What is the general
> consensus on providing such a service, particularly in terms of
> processing overhead and manageability.  Is there another way to prevent
> this type of attack, aside from watching packets go by and trying to
> trace it back through the source.  The source IPs are spoofed.
> Thanks!
> Christian Martin