[135211] in North American Network Operators' Group
Re: Auto ACL blocker
daemon@ATHENA.MIT.EDU (Greg Whynott)
Tue Jan 18 14:33:44 2011
From: Greg Whynott <Greg.Whynott@oicr.on.ca>
To: "Brian R. Watters" <brwatters@absfoc.com>
Date: Tue, 18 Jan 2011 14:31:10 -0500
In-Reply-To: <29286818.215.1295377932987.JavaMail.root@mail.absfoc.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
send/expect?
On Jan 18, 2011, at 2:12 PM, Brian R. Watters wrote:
> We are looking for the following solution.
>
> Honey pot that collects attacks against SSH/FTP and so on
>
> Said attacks are then sent to a master ACL on a edge Cisco router to bloc=
k all traffic from these offenders ..
>
> Of course we would require a master whitelist as well as to not be blocke=
d from our own networks.
>
> Any current solutions or ideas ??
>
> --
>
> BRW
--
This message and any attachments may contain confidential and/or privileged=
information for the sole use of the intended recipient. Any review or dist=
ribution by anyone other than the person for whom it was originally intende=
d is strictly prohibited. If you have received this message in error, pleas=
e contact the sender and delete all copies. Opinions, conclusions or other =
information contained in this message may not be that of the organization.