var sidebar_align = 'right';
var content_container_margin = parseInt('350px');
var sidebar_width = parseInt('330px');
Security checklists and recommendations for a Cisco 3550
We colocated a space in a datacenter for a site backup. We installed a 3550-EMI 48 to do the job, but I would like to improve the security inside the 3550. I am looking for some checklists or recommendations to apply and try to keep out people with bad ideas, as trying to access our 3550 or trying to do a DDoS...
A 3550 isn't going to protect you from that big of a ddos attack. Its a layer 3 switch not a firewall or filter module. All you need is some tight acls and policys and you should be set.
Edge 1, LLC
Cisco SMARTnet & Licensing Specialists | Datacenter/Network Design & Management Consulting | Cisco New & Certified Refurb Equipment Sales
I wouldn't go with a 3550 they are fairly old and don't have the granular acl ability of a 3560.
http://www.lanblvd.com/productpage.cfm?prodid=1213 if you have the "E" code you can upgrade it to full L3 otherwise http://www.lanblvd.com/productpage.cfm?prodid=1212
This is true; 3550s will fall over from DoS consisting of high PPS.
Originally Posted by
You didn't answer his question though.
All you need is some tight acls and policys and you should be set.
You'll obviously need to replace the source IP and mask in the ACL, etc. Also do this for snmp if you're running it.
Switch(config)#access-list 120 permit tcp 126.96.36.199 0.0.0.7 any eq telnet
Switch(config)#line vty 0 4
Switch(config-line)#access-class 120 in
and dedicated servers by Jacksonville Colocation colo 4 jax We are *not* a reseller. We own our servers, switches, routers and racks.