thanks for the input
Mike
On Thu, Jul 7, 2022 at 10:20 AM Jeff Haas wrote:
> In circumstances where the routing table can help you mitigate an attack,
> including things that use uRPF, it'll usually scale significantly better
> that flowspec. This is primarily because flowspec is just a
In circumstances where the routing table can help you mitigate an attack,
including things that use uRPF, it'll usually scale significantly better that
flowspec. This is primarily because flowspec is just a distributed way of
programming the firewall, and firewalls on transit routers have many
Hi,
On Thu, Jul 07, 2022 at 08:41:56AM -0400, harbor235 via juniper-nsp wrote:
> Since Flowspec arrived, are there any uses for SRTBH?
Scaling?
My understanding of flowspec is that it is typically implemented by
programming ACL TCAM, while SRTBH is routing table lookup, so
"some 10.000 lines"
Since Flowspec arrived, are there any uses for SRTBH?
Anyone using TrinityCyber, them use a different approach to IDS and is not
strictly signature based but more TTPs? Write up appear to be good, curious
if anyone is using their products?
Mike
___
4 matches
Mail list logo