[135211] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Auto ACL blocker

daemon@ATHENA.MIT.EDU (Greg Whynott)
Tue Jan 18 14:33:44 2011

From: Greg Whynott <Greg.Whynott@oicr.on.ca>
To: "Brian R. Watters" <brwatters@absfoc.com>
Date: Tue, 18 Jan 2011 14:31:10 -0500
In-Reply-To: <29286818.215.1295377932987.JavaMail.root@mail.absfoc.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

send/expect?

On Jan 18, 2011, at 2:12 PM, Brian R. Watters wrote:

> We are looking for the following solution.
>
> Honey pot that collects attacks against SSH/FTP and so on
>
> Said attacks are then sent to a master ACL on a edge Cisco router to bloc=
k all traffic from these offenders ..
>
> Of course we would require a master whitelist as well as to not be blocke=
d from our own networks.
>
> Any current solutions or ideas ??
>
> --
>
> BRW


--

This message and any attachments may contain confidential and/or privileged=
 information for the sole use of the intended recipient. Any review or dist=
ribution by anyone other than the person for whom it was originally intende=
d is strictly prohibited. If you have received this message in error, pleas=
e contact the sender and delete all copies. Opinions, conclusions or other =
information contained in this message may not be that of the organization.


home help back first fref pref prev next nref lref last post