12-31-2023 12:13 AM
Hi i have been studying about port security how do they set Port Security in an ISP how can they handle all the MAC-Flooding attack
it would be really helpful if you put your resources or any books that can help evolve my knowledge
best regards.
Solved! Go to Solution.
12-31-2023 01:48 AM
Hello @mohammedalrawiib
Port security is often implemented at the network edge to control which devices can connect to the network.
From an ISP perspective, the implementation of storm control is a common practice to manage and control excessive broadcast, multicast, or unknown unicast traffic. Storm control helps prevent network disruptions caused by an overwhelming volume of such traffic. Dtorm control is just one element of a comprehensive network management and security strategy.
Apply rate limiting on specific types of traffic to control the rate at which certain packets are sent or received. This can help prevent network congestion and protect against certain types of attacks.
12-31-2023 01:48 AM
Hello @mohammedalrawiib
Port security is often implemented at the network edge to control which devices can connect to the network.
From an ISP perspective, the implementation of storm control is a common practice to manage and control excessive broadcast, multicast, or unknown unicast traffic. Storm control helps prevent network disruptions caused by an overwhelming volume of such traffic. Dtorm control is just one element of a comprehensive network management and security strategy.
Apply rate limiting on specific types of traffic to control the rate at which certain packets are sent or received. This can help prevent network congestion and protect against certain types of attacks.
12-31-2023 01:58 AM
There are many products available in the market to prevent not only DDoS attack or many other attacks.
I have used some time back RADWARE for DDOS protection :
https://www.radware.com/2023-h1-global-threat-analysis-report/#menu-tab-ddos-protection
Some good explanation - i collected when i was reading in the context of security.
https://datadome.co/learning-center/how-to-stop-ddos-attacks/
12-31-2023 02:02 AM
I have ONE ISP with SW and many CE,
the costumer use PPPoE or use DHCP to get IP from ISP.
then this SW must protect by
Port-security (or use DHCP client-ID, this protect ISP from any unknown device)
use Storm-control to control the limit of broadcast send from CE to ISP
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide