[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: survey of isp security practices



On Wed, 17 Nov 2004 13:26:12 -0500, Howard C. Berkowitz
<hcb@gettcomm.com> wrote:

> 
> Would it be fair to say, then, that while the authentication server
> itself is out of scope, denial of service on the connectivity between
> edge routers, router console functions, etc., would be within scope?

yes, to the extent that it can be  phrased in terms of device capabilities.

> In other words, it would be in scope to identify secure protocol
> mechanisms and protection against DoS, but as seen by the core
> network element?

For instance, there's not much you can say/do about a saturated link....if the
upstreams are filling the pipe, the pipe will be full....but you might say
something like "supports features to mitigate syn floods" (that
particularl wording
would need a lot of work, references, etc.).

---George