Hello Doug, >I don't think you have to put all the access-list in. I believe that >the hack requires a certain combination of packets to the four ports, >so leaving one or two of them open should still prevent the hack.
Firstly, remember that these are IP protocols we are referring to, not TCP/UDP ports. Secondly, we have confirmed that the DoS can be performed using any one of the protocols. So if, for example, you block three of the protocols and leave protocol 53 open you are still toast. Ian Genge __________________________________________________ Senior Network Engineer CSC --------------------------------------------------------------------------- ----------------------------------------------------------------------------
