Hi All
I know this might sound like a pretty basic question but..
when using the ip source-track command, once the source interface of
the attack has been identified at the network edge,
I am assuming we would still need to apply a logged ACL on the ingress
interface to identify which source is carrying out the attack?
Also my next question is, is there any other way to identify the
source of an attack other than using ACLs or ip source tracker?
Thanks in advance
Blogs and organic groups at http://www.ccie.net
Received on Sat Nov 20 2010 - 13:21:59 ART
This archive was generated by hypermail 2.2.0 : Sun Dec 05 2010 - 22:14:56 ART