Craig A. Huegen <chuegen@cisco.com>
Smurf Attack Description & Supression
NANOG 11     9
Prevention Techniques
•How to suppress an attack if you’re the victim:
Implement ACL’s at network edges to block ICMP echo responses to your high-visibility hosts, such as IRC servers
Again, will impair troubleshooting -- “ping” breaks
Will still allow your access pipes to fill
Work with upstream providers to determine the help they can provide to you
Blocking ICMP echoes for high-visibility hosts from coming through your access pipes
Tracing attacks
•