North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical RE: Access Lists
That is what I am going to do. But with over 100 downstream customers, and IOS 11.1 (sans named access lists) I don't want to start a precedent. Thanks! On Wed, 25 Mar 1998, Jain Depak Wrote Why not just filter all ping traffic to his T1 until the attack subsides? -Deepak. On Wed, 25 Mar 1998, Martin, Christian wrote: > Hello All, > > I have a customer who is being ping-flooded. His bandwidth is being > sucked up due to these floods, and wishes me to block them on my router. > I am somewhat reluctant to do this, since it goes against our policy; > however, the customer has been very patient with us on this issue and > his patience is running out. > > I would be implementing on a Cisco 7507, with 3 T-3s to the Internet, > and the customer hangs off the router on a T-1. What is the general > consensus on providing such a service, particularly in terms of > processing overhead and manageability. Is there another way to prevent > this type of attack, aside from watching packets go by and trying to > trace it back through the source. The source IPs are spoofed. > > Thanks! > Christian Martin >
|