Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Identifying DoS-attacked IP address(es)

  • From: Feger, James
  • Date: Mon Dec 16 18:52:24 2002

AT&T also does the basics.  ACL's, null routes, tracking back to ingress.

-james


On Mon, 16 Dec 2002, James-lists wrote:

>
> > I'm sure you can look in the archives of this list for
> messages from me
> > about this very thing... :) In short: "Every ISP should
> have 24/7 security
> > support for customers under attack." That support should
> include, acls,
> > null routes, tracking the attack to the ingress. Rarely do
> rate-limits do
> > any good in the case of DoS attacks... (this part is a
> debate for another
> > thread)
>
> Yes, we have those ready to go. And tools like Snort/Spade
> and Net Flow to identify the problem
> and suggest ACL's and null routes, ect. My question is more
> about an upstream provider for an ISP
> (I was calling this backbone). Clearly UU has a system well
> in place but I would like to hear others experiences
> with their upstream providers and DoS's. I know what kind of
> help me upstreams will provide, as I have asked,
> I am just trying to get a feel for others experiences.
>
> James Edwards
> jamesh@cybermesa.com
> At the Santa Fe Office: Internet at Cyber Mesa
> Store hours: 9-6 Monday through Friday
> Phone support 365 days till 10 pm via the Santa Fe office:
> 505-988-9200
>
>
>
>





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.