[c-nsp] Equipment for a large-ish LAN event
Peter Salanki
peter at salanki.st
Wed Dec 9 17:44:51 EST 2015
> On Dec 9, 2015, at 17:31, Lukas Tribus <luky-37 at hotmail.com> wrote:
>
>> I was thinking for worst case, perhaps a sore loser after getting
>> killed in the game decides to generate traffic with the intention
>> of creating issues
>
> That guy will generate traffic that looks like gaming traffic ...
>
>
>
>> By priority queuing game traffic
>
> ... you will most likely have to police your PQ, therefor creating
> an artificial bottleneck making the DoS even easier.
>
> You would have to rate-limit gaming-traffic on each access-port,
> but this is getting so complex, you would probably keep tuning
> your QoS policies 12 hours into the event (can you really predict
> game traffic *before the event takes place* and guarantee smooth
> gaming in all conditions? I don't think so).
>
> I would invest more time into a good netflow configuration
> (and a baseball bat for the field engineer).
>
>
> When talking about DoS, its very easy to makes things worse with
> QoS and firewalls, thats what all I'm saying.
+1
Don’t over engineer. You have end-to-end control. If someone is DoSing just trace the MAC to the client port and apply baseball bat. Add on Netflow and port graphs if you have the time.
>
>
>
> Regards,
>
> Lukas
>
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list