On Jul 23, 2007, at 7:19 AM, Jim Devane wrote:

> What other methods might be more effective?

Identify the sources and use S/RTBH, if your platform(s) support uRPF  
(keeping in mind the attackers might be spoofing the sources).

-----------------------------------------------------------------------
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice

        Culture eats strategy for breakfast.

                -- Ford Motor Company



_______________________________________________
cisco-nsp mailing list  [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to