<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: case study required in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/case-study-required/m-p/710643#M88056</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Effectively protecting against a DDoS at the endpoint is impossible since your bandwidth would already be overwhelmed at that time.  To protect against a DDoS you'll need the ISP's assistance (so they can re-route &amp;amp; scrub the attack before it floods your ingress point(s)).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plug:  I work for AT&amp;amp;T and we provide a DDoS mitigation service.  Traffic inbound for your ingress point(s) are re-routed on the AT&amp;amp;T backbone to a scrubbing facility.  After the 'bad' traffic is scrubbed, the 'good' traffic is routed back to you.  I'm vastly oversimplifying but the point is your ingress point(s) are not overwhelmed even in the face of an attack which ordinarily would take you down.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Dec 2006 17:28:53 GMT</pubDate>
    <dc:creator>attmidsteam</dc:creator>
    <dc:date>2006-12-15T17:28:53Z</dc:date>
    <item>
      <title>case study required</title>
      <link>https://community.cisco.com/t5/network-security/case-study-required/m-p/710642#M88055</link>
      <description>&lt;P&gt;Can some one on the list point me to a Cisco case study where IPS is successfully used as a detection and mitigation device in dos attacks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is IPS necessary the best way for protecting the ingress of the network from DDOS or DOS ATTACKS? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What other ways are there to guard the internet bandwidth from Denial of service?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/case-study-required/m-p/710642#M88055</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2019-03-10T10:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: case study required</title>
      <link>https://community.cisco.com/t5/network-security/case-study-required/m-p/710643#M88056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Effectively protecting against a DDoS at the endpoint is impossible since your bandwidth would already be overwhelmed at that time.  To protect against a DDoS you'll need the ISP's assistance (so they can re-route &amp;amp; scrub the attack before it floods your ingress point(s)).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plug:  I work for AT&amp;amp;T and we provide a DDoS mitigation service.  Traffic inbound for your ingress point(s) are re-routed on the AT&amp;amp;T backbone to a scrubbing facility.  After the 'bad' traffic is scrubbed, the 'good' traffic is routed back to you.  I'm vastly oversimplifying but the point is your ingress point(s) are not overwhelmed even in the face of an attack which ordinarily would take you down.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Dec 2006 17:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/case-study-required/m-p/710643#M88056</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2006-12-15T17:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: case study required</title>
      <link>https://community.cisco.com/t5/network-security/case-study-required/m-p/710644#M88057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at Cisco's Guard DDoS Mitigation Appliances:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps5888/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps5888/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2006 14:32:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/case-study-required/m-p/710644#M88057</guid>
      <dc:creator>andrew.burns</dc:creator>
      <dc:date>2006-12-19T14:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: case study required</title>
      <link>https://community.cisco.com/t5/network-security/case-study-required/m-p/710645#M88058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check following Cisco IPS 4200 Series Sensors&lt;/P&gt;&lt;P&gt;Case Studies&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/prod_case_studies_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/prod_case_studies_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2006 14:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/case-study-required/m-p/710645#M88058</guid>
      <dc:creator>m.sir</dc:creator>
      <dc:date>2006-12-19T14:40:03Z</dc:date>
    </item>
  </channel>
</rss>

