[c-nsp] ACLS for Virus

Roland Dobbins rdobbins at cisco.com
Sun Sep 17 17:47:09 EDT 2006


On Sep 17, 2006, at 1:32 PM, Jens Link wrote:

> Seth Mattinen <sethm at rollernet.us> writes:
>
>> If you know what port/protocol some attack is using, sure, you can  
>> apply
>> an ACL against that just like anything other traffic.
>
> And you probably will block some legitimate traffic.

It's possible to perform more granular filtering based upon packet  
header and/or payload contents on software-based platforms with FPM:

http://www.cisco.com/en/US/products/ps6642/ 
products_white_paper0900aecd803936f6.shtml

------------------------------------------------------------------------
Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice

One of the main causes of the fall of the Roman Empire was that, lacking
zero, they had no way to indicate successful termination of their C
programs.

            	         -- Robert Firth






More information about the cisco-nsp mailing list