[Webinar] RRL – Strategies for a Successful Deployment – Afternoon Session

[Webinar] RRL – Strategies for a Successful Deployment – Afternoon Session

RRL is a valuable weapon in the fight against DDoS attacks, but your production network is no place to learn by trial and error. We are pleased to offer an RRL how-to session with the specific goal of teaching you how to best configure RRL to mitigate the risk of a DDoS attack.

Join ISC staff members Peter Losher, Sr. Operations Architect, and Eddy Winstead, Sr. Systems Engineer, as they walk through an RRL implementation step-by-step. Specific topics covered include:

  • Configuration options
  • How and when to utilize log files
  • ISC’s experience with running RRL, on our own network as well as SNS and F-root
  • Potential side effects
  • Upcoming classifier options

This session is a follow-up to our previous webinar, RRL – DDoS Defense Module for BIND, and is recommended for network operators, system engineers, and system administrators.

For more information on RRL, please visit our KnowledgeBase or join our mailing list to keep track of what we’re doing next.

Date and Time

Date 20 November, 2013

Time 4:00 PM - 5:00 PM (PST)

Registration Register for this Event

Last modified: October 29, 2013 at 4:54 pm