[c-nsp] ACLS for Virus
Roland Dobbins
rdobbins at cisco.com
Sun Sep 17 17:47:09 EDT 2006
On Sep 17, 2006, at 1:32 PM, Jens Link wrote:
> Seth Mattinen <sethm at rollernet.us> writes:
>
>> If you know what port/protocol some attack is using, sure, you can
>> apply
>> an ACL against that just like anything other traffic.
>
> And you probably will block some legitimate traffic.
It's possible to perform more granular filtering based upon packet
header and/or payload contents on software-based platforms with FPM:
http://www.cisco.com/en/US/products/ps6642/
products_white_paper0900aecd803936f6.shtml
------------------------------------------------------------------------
Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice
One of the main causes of the fall of the Roman Empire was that, lacking
zero, they had no way to indicate successful termination of their C
programs.
-- Robert Firth
More information about the cisco-nsp
mailing list