 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
How
to prevent your network from being the
|
|
|
|
source
of the attack:
|
|
|
|
Apply
filters to each customer network
|
|
|
|
Apply
filters to your upstreams
|
|
|
• |
This
removes the possibility of your network
|
|
|
being
used as an attack source for many
|
|
|
attacks
which rely on anonymity (source spoof)
|