netsec-sig - [Security-WG] A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET
Subject: Internet2 Network Security SIG
List archive
- From: Karl Newell <>
- To: "" <>
- Subject: [Security-WG] A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET
- Date: Tue, 26 Jan 2016 21:17:20 +0000
- Accept-language: en-US
- Authentication-results: internet2.edu; dkim=none (message not signed) header.d=none;internet2.edu; dmarc=none action=none header.from=internet2.edu;
- Spamdiagnosticoutput: 1:0
A10 Networks will be presenting their DDoS mitigation capabilities to our group on Thursday, February 4 from 3pm - 4pm ET.
Adobe connect will be used for the presentation, which will also be recorded for any working
group members unable to attend.
To join the meeting:
http://internet2.acrobat.com/venus/
If you have never attended a Connect Pro meeting before:
Test your connection:
http://internet2.acrobat.com/common/help/en/support/meeting_test.htm
Get a quick overview:
http://www.adobe.com/products/adobeconnect.html
Presenting for A10 Networks will be:
Erik Cooper
Regional Sales Director
A10 Networks
DC, VA, WV, NC, & SC
M - 301.801.1765
Pete Kowalsky
Sr Systems Engineer — Mid-Atlantic
A10 Networks
M – 703.829.0910
Ahmad Nassiri
A10 Networks
Potential topics to be covered including but not limited to are:
Describe how your service addresses the following attacks against a
university or regional network:
* DDoS attacks that result in a high volume of inbound traffic (greater
than 10Gb/s) and disrupt both the targeted services as well as the
operation of the network itself.
* Persistent DDoS attacks against key services or infrastructure (DNS, key
web server, VPN, etc.)
Capabilities we’re interested in, but will welcome a more expansive
response:
* host a service remotely always and/or during an attack
* detect and alert of an attack
* scrub traffic
* work with major ISPs to coordinate mitigation
* DNS services
* layer 7-aware firewall/scrubbing
Please plan to include details such as:
* mechanisms supported for announcing prefixes for a scrubbing service
(e.g., BGP signaling)
* attack/service dashboard
* on-boarding process
* capacity
* how are SSL sessions proxied (who supplies keys, etc.)
Regards,
--
Karl Newell
Cyberinfrastructure Security Engineer
Internet2
520-344-0459
|
BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Microsoft Corporation//Outlook for Mac MIMEDIR//EN METHOD:PUBLISH BEGIN:VTIMEZONE TZID:Arizona X-ENTOURAGE-CFTIMEZONE:America/Phoenix X-ENTOURAGE-TZID:70 BEGIN:STANDARD TZOFFSETFROM:-0700 TZOFFSETTO:-0700 DTSTART:16010101T000000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT UID:4365119B-09DD-4684-84CE-2790F8627585 X-ENTOURAGE_UUID:4365119B-09DD-4684-84CE-2790F8627585 DTSTAMP:20160126T204034Z DTSTART;TZID=Arizona:20160204T130000 DTEND;TZID=Arizona:20160204T140000 LAST-MODIFIED:20160126T211118Z SUMMARY:A10 DDoS Mitigation Presentation DESCRIPTION:A10 Networks will be presenting their DDoS mitigation capabilities to\nour group on Thursday\, February 4 from 3pm - 4pm ET. Adobe connect will be\nused for the presentation\, which will also be recorded for any working\ngroup members unable to attend.\n\nTo join the meeting:\n \nhttp://internet2.acrobat.com/venus/\n\nIf you have never attended a Connect Pro meeting before:\n Test your connection:\nhttp://internet2.acrobat.com/common/help/en/support/meeting_ test.htm\n\n Get a quick overview:\nhttp://www.adobe.com/products/adobeconnect.html\n\n\nPresentin g for A10 Networks will be:\n\nErik Cooper\nRegional Sales Director\nA10 Networks\nDC\, VA\, WV\, NC\, & SC\nM - 301.801.1765\nPete Kowalsky\nSr Systems Engineer â Mid-Atlantic\nA10 Networks\nM â 703.829.0910\nAhmad Nassiri\nA10 Networks\\n\n\n\nPotential topics to be covered including but not limited to are:\n\nDescribe how your service addresses the following attacks against a\nuniversity or regional network:\n* DDoS attacks that result in a high volume of inbound traffic (greater\nthan 10Gb/s) and disrupt both the targeted services as well as the\noperation of the network itself.\n* Persistent DDoS attacks against key services or infrastructure (DNS\, key\nweb server\, VPN\, etc.)\n\nCapabilities we¹re interested in\, but will welcome a more expansive\nresponse:\n* host a service remotely always and/or during an attack\n* detect and alert of an attack\n* scrub traffic\n* work with major ISPs to coordinate mitigation\n* DNS services\n* layer 7-aware firewall/scrubbing\n\nPlease plan to include details such as:\n* mechanisms supported for announcing prefixes for a scrubbing service\n(e.g.\, BGP signaling)\n* attack/service dashboard\n* on-boarding process\n* capacity\n* how are SSL sessions proxied (who supplies keys\, etc.)\n ORGANIZER:MAILTO: SEQUENCE:0 X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-ALLDAYEVENT:FALSE X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MICROSOFT-CDO-INSTTYPE:0 BEGIN:VALARM ACTION:DISPLAY DESCRIPTION:REMINDER TRIGGER;RELATED=START:-PT00H15M00S END:VALARM END:VEVENT END:VCALENDAR
- [Security-WG] A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET, Karl Newell, 01/26/2016
Archive powered by MHonArc 2.6.16.