Joachim, filter, get your upstream to filter, and have them get their
upstream to filter. Mitigation usually involves dropping packets at
the edge of your network, then the edge of your upstreams network, and
so on up the chain. Of course, you will have to identify sources of
packets floods first, then filter on those £dress ranges. Rgds, mctim

On 12/13/10, joachim Gwoke <[email protected]> wrote:
> I am seeing a lot of ways to take down websites, networks etc.
> any chance of seeing any defenses against such and such? Or is that just
> plain boring?
>
>
> regards
> Joachim
>
>
>
> _______________________________________________
> The Uganda Linux User Group: http://linux.or.ug
>
> Send messages to this mailing list by addressing e-mails to: [email protected]
> Mailing list archives: http://www.mail-archive.com/[email protected]/
> Mailing list settings: http://kym.net/mailman/listinfo/lug
> To unsubscribe: http://kym.net/mailman/options/lug
>
> The Uganda LUG mailing list is generously hosted by INFOCOM:
> http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>

-- 
Sent from my mobile device

Cheers,

McTim
"A name indicates what we seek. An address indicates where it is. A
route indicates how we get there."  Jon Postel
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to