Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does IG 200/2000 handle filled pipes?

filled IG pipes
0
Posted

How does IG 200/2000 handle filled pipes?

0

IG200/2000 can communicate with upstream service providers to null route the source or destination. We have seen filled pipes at many of our customers recently. Without our appliance, the customer had no visibility as to what was going on and what the attack was. Their network equipment including high-end firewalls would simply die under such floods. With our device in front, they were able to stop the attacks from going further and get a visibility into the attack. They were able to work with their ISPs after getting detailed reports from us. Ask us about this advanced feature. Q: Can the IG200/IG2000 identify the originator of an intrusion or attack? A: Yes. The Source Tracking feature captures the source address of an offending non-spoofed attacker and can block all further transmission attempts pending administrator intervention. The offending address is reported in the events log and an email can be automatically generated and sent to the offender’s domain administrator. Q: Can th

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123