Which mitigation technique is most effective against the above - ProProfs Discuss
Advertisement

Which mitigation technique is most effective against the above attack?

Asked by Heavenlymixed, Last updated: Apr 13, 2024

+ Answer
Request
Question menu
Vote up Vote down

3 Answers

HomePC

HomePC

HomePC
HomePC

Answered Oct 17, 2018

I think the question omitted the fact that the attack is coming from outside the network. The drop RFC 1918 request is to tell the ISP to block all traffic from spoofed Private IP addresses, which I thought all ISPs did already. I assumed it was a malware infected workstation inside the network and choose the ACL Firewall rule as the answer to block all traffic from the infected workstation. I don't like the question.

upvote downvote
Reply 

walterbyrd

walterbyrd

walterbyrd
Walterbyrd

Answered Jul 21, 2018

Can anybody provide an explanation as to why that is the best answer?

upvote downvote
Reply 

heavenlymixed86

heavenlymixed

heavenlymixed86
Heavenlymixed

Answered Jan 10, 2018

The company should contact the upstream ISP and ask that RFC 1918 traffic be dropped
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.