How does IG 200/2000 handle filled pipes?
IG200/2000 can communicate with upstream service providers to null route the source or destination. We have seen filled pipes at many of our customers recently. Without our appliance, the customer had no visibility as to what was going on and what the attack was. Their network equipment including high-end firewalls would simply die under such floods. With our device in front, they were able to stop the attacks from going further and get a visibility into the attack. They were able to work with their ISPs after getting detailed reports from us. Ask us about this advanced feature. Q: Can the IG200/IG2000 identify the originator of an intrusion or attack? A: Yes. The Source Tracking feature captures the source address of an offending non-spoofed attacker and can block all further transmission attempts pending administrator intervention. The offending address is reported in the events log and an email can be automatically generated and sent to the offender’s domain administrator. Q: Can th