[Webinar] RRL – Strategies for a Successful Deployment – Afternoon Session
RRL is a valuable weapon in the fight against DDoS attacks, but your production network is no place to learn by trial and error. We are pleased to offer an RRL how-to session with the specific goal of teaching you how to best configure RRL to mitigate the risk of a DDoS attack.
Join ISC staff members Peter Losher, Sr. Operations Architect, and Eddy Winstead, Sr. Systems Engineer, as they walk through an RRL implementation step-by-step. Specific topics covered include:
- Configuration options
- How and when to utilize log files
- ISC’s experience with running RRL, on our own network as well as SNS and F-root
- Potential side effects
- Upcoming classifier options
This session is a follow-up to our previous webinar, RRL – DDoS Defense Module for BIND, and is recommended for network operators, system engineers, and system administrators.
Date and Time
Time 4:00 PM - 5:00 PM (PST)
Registration Register for this Event