We also kept a "whitelist" of IP addresses that could not be blocked. What do you expect for $0 and $0 per month? :)

Travis


On 7/14/2017 3:21 PM, Mike Hammett wrote:
Until someone starts spoofing Google's authoritative DNS servers or root DNS servers or....



-----
Mike Hammett
Intelligent Computing Solutions <http://www.ics-il.com/>
<https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
Midwest Internet Exchange <http://www.midwest-ix.com/>
<https://www.facebook.com/mdwestix><https://www.linkedin.com/company/midwest-internet-exchange><https://twitter.com/mdwestix>
The Brothers WISP <http://www.thebrotherswisp.com/>
<https://www.facebook.com/thebrotherswisp>


<https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
------------------------------------------------------------------------
*From: *"Travis Johnson" <[email protected]>
*To: *[email protected]
*Sent: *Friday, July 14, 2017 4:19:05 PM
*Subject: *Re: [AFMUG] DDoS protection vendor?

Hey,

Back in the day (4 years ago), we used Mikrotik for our main core
routers. We would allocate a single IP address from each /24 (randomly
selected) and then we created a rule that any outside IP address that
even "touched" that IP was added to our Blackhole address list and
dropped on the incoming interfaces.

This was a cheap, easy way to stop many, many attacks. Our blackhole
list often contained 50,000+ IP addresses.

Travis


On 7/14/2017 10:59 AM, Andreas Wiatowski wrote:
> I agree. It solves many problems. We had 1 this year… had to drop a /24 for about 5 minutes. The other option is to BGP cloud scrub… much bigger $.
>
> What we have found is that dealing with even small attacks or identified attacks has slowed the frequency and intensity. Regardless, if you’re a target, you’re going to get hurt in today’s day and age.
>
> Cheers,
>
> Andreas Wiatowski, CEO
> Silo Wireless Inc.
> 1-866-727-4138 x-600
> http://www.silowireless.com <http://www.silowireless.com/>
> Wireless | Fibre | VoIP | PBX | IPTV
>
> _________________________________
> The contents of this email message and any attachments are intended solely for the addressee(s) and may contain confidential and/or privileged information and may be legally protected from disclosure. If you are not the intended recipient of this message or their agent, or if this message has been addressed to you in error, please immediately alert the sender by reply email and then delete this message and any attachments. If you are not the intended recipient, you are hereby notified that any use, dissemination, copying, or storage of this message or its attachments is strictly prohibited.
>
>
> On 2017-07-14, 12:44 PM, "Af on behalf of Seth Mattinen" <[email protected] on behalf of [email protected]> wrote:
>
>      On 7/14/17 09:04, Andreas Wiatowski wrote:
> > We implemented Corero. It works as advertised, all our traffic is > > scrubbed on the fly and only bad traffic is dumped This is at our main > > core, 2 separate 10Gbps feeds. We also have a secondary site with > > 10Gbps and it has a corero as well. It has allowed us to sleep at night!
>      >
>
>
> I don't see how this would help if an attacker tries to shove 40Gbps
>      down 2x10GbE pipes.
>
>      ~Seth
>
>



Reply via email to