nanog mailing list archives
Access Lists
From: "Martin, Christian" <CMartin () mercury balink com>
Date: Wed, 25 Mar 1998 18:49:28 -0500
Hello All, I have a customer who is being ping-flooded. His bandwidth is being sucked up due to these floods, and wishes me to block them on my router. I am somewhat reluctant to do this, since it goes against our policy; however, the customer has been very patient with us on this issue and his patience is running out. I would be implementing on a Cisco 7507, with 3 T-3s to the Internet, and the customer hangs off the router on a T-1. What is the general consensus on providing such a service, particularly in terms of processing overhead and manageability. Is there another way to prevent this type of attack, aside from watching packets go by and trying to trace it back through the source. The source IPs are spoofed. Thanks! Christian Martin
Current thread:
- Access Lists Martin, Christian (Mar 25)
- Re: Access Lists Dan Boehlke (Mar 25)
- Re: Access Lists Phil Howard (Mar 25)
- Re: Access Lists Dan Boehlke (Mar 26)
- Re: Access Lists Phil Howard (Mar 26)
- Re: Access Lists Phil Howard (Mar 25)
- Re: Access Lists Dan Boehlke (Mar 25)
- <Possible follow-ups>
- RE: Access Lists Martin, Christian (Mar 25)
- Re: Access Lists Steve Sobol (Mar 26)
- RE: Access Lists Martin, Christian (Mar 25)
- RE: Access Lists Rich Sena (Mar 26)
- Re: Access Lists Steve Sobol (Mar 26)
- RE: Access Lists Martin, Christian (Mar 26)