(I believe this feature has been discontinued in newer versions of IOS. I
know when I was doing a lab with that feature my IOS had that removed
already)
Regards.
On Sat, Nov 20, 2010 at 7:21 AM, Yaseen Mirza <yaseengs_at_gmail.com> wrote:
> Hi All
>
> I know this might sound like a pretty basic question but..
>
> when using the ip source-track command, once the source interface of
> the attack has been identified at the network edge,
> I am assuming we would still need to apply a logged ACL on the ingress
> interface to identify which source is carrying out the attack?
>
> Also my next question is, is there any other way to identify the
> source of an attack other than using ACLs or ip source tracker?
>
> Thanks in advance
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Sat Nov 20 2010 - 13:10:22 ART
This archive was generated by hypermail 2.2.0 : Sun Dec 05 2010 - 22:14:56 ART