j
k
j a
j l
Source address verification at access layer and rate limiting icmp would be fine starts.
these are "best practices" and not "DDoS Protection" imho
Back to the thread
Back to the list