From: Ali Mousawi (mousawi.ali@gmail.com)
Date: Thu Sep 18 2008 - 20:06:54 ART
Hello Guys,
I was reading in the DocCD and I got to ip source tracker
http://www.cisco.com/en/US/docs/ios/security/configuration/guide/sec_ip_srce_trackr_ps6350_TSD_Products_Configuration_Guide_Chapter.html
I am still confused about how this work... According to my understanding we
shall configure the router nearest to host (being attacked) then go to the
upstream route. Is that right?
Regards
Ali
Blogs and organic groups at http://www.ccie.net
This archive was generated by hypermail 2.1.4 : Sat Oct 04 2008 - 09:26:18 ART