This section presents a collection of best practices destined to preserve the resiliency and survivability of routers and switches, helping the network maintain availability even during the execution of an attack. Possible attacks include DoS based on unauthorized and authorized protocols, Distributed DoS, flood attacks, reconnaissance, unauthorized access and more. Routers and switches may be subject to attacks designed to or that indirectly affect the network availability. Device Resiliency and Survivability Summary.Control Plane Protection Recommended Deployment Methodology.CoPP Recommended Deployment Methodology.rACL Recommended Deployment Methodology.iACL Recommended Deployment Methodology. ![]() Infrastructure Protection Access Control Lists (iACLs).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |