Hi Tom
This feature is still in 12.4T and is therefore relevant for the R&S
lab and i have seen this covered in vendor workbooks but not in any
depth.
Was looking for further info and alternatives to identifying source of attacks.
On 20 November 2010 19:10, Tom Kacprzynski <tom.kac_at_gmail.com> wrote:
> (I believe this feature has been discontinued in newer versions of IOS. I
> know when I was doing a lab with that feature my IOS had that removed
> already)
>
> Regards.
>
> On Sat, Nov 20, 2010 at 7:21 AM, Yaseen Mirza <yaseengs_at_gmail.com> wrote:
>
>> Hi All
>>
>> I know this might sound like a pretty basic question but..
>>
>> when using the ip source-track command, once the source interface of
>> the attack has been identified at the network edge,
>> I am assuming we would still need to apply a logged ACL on the ingress
>> interface to identify which source is carrying out the attack?
>>
>> Also my next question is, is there any other way to identify the
>> source of an attack other than using ACLs or ip source tracker?
>>
>> Thanks in advance
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Sat Nov 20 2010 - 23:40:05 ART
This archive was generated by hypermail 2.2.0 : Sun Dec 05 2010 - 22:14:56 ART