On Jul 23, 2007, at 7:19 AM, Jim Devane wrote:
> What other methods might be more effective?
Identify the sources and use S/RTBH, if your platform(s) support uRPF
(keeping in mind the attackers might be spoofing the sources).
-----------------------------------------------------------------------
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice
Culture eats strategy for breakfast.
-- Ford Motor Company
_______________________________________________
cisco-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/