Skip to Content.
Sympa Menu

netsec-sig - [Security-WG] Reminder: A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET

Subject: Internet2 Network Security SIG

List archive

[Security-WG] Reminder: A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET


Chronological Thread 
  • From: Karl Newell <>
  • To: "" <>
  • Subject: [Security-WG] Reminder: A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET
  • Date: Thu, 4 Feb 2016 16:12:32 +0000
  • Accept-language: en-US
  • Authentication-results: internet2.edu; dkim=none (message not signed) header.d=none;internet2.edu; dmarc=none action=none header.from=internet2.edu;
  • Spamdiagnosticoutput: 1:0


A10 Networks will be presenting their DDoS mitigation capabilities to our group on Thursday, February 4 from 3pm - 4pm ET.  

Adobe connect will be used for the presentation, which will also be recorded for any working
group members unable to attend.

To join the meeting:
       

If you have never attended a Connect Pro meeting before:
     Test your connection:

     Get a quick overview:


Presenting for A10 Networks will be:

Erik Cooper
Regional Sales Director
A10 Networks
DC, VA, WV, NC, & SC
M - 301.801.1765

Pete Kowalsky
Sr Systems Engineer — Mid-Atlantic
A10 Networks
M – 703.829.0910

Ahmad Nassiri
A10 Networks



Potential topics to be covered including but not limited to are:

Describe how your service addresses the following attacks against a
university or regional network:
* DDoS attacks that result in a high volume of inbound traffic (greater
than 10Gb/s) and disrupt both the targeted services as well as the
operation of the network itself.
* Persistent DDoS attacks against key services or infrastructure (DNS, key
web server, VPN, etc.)

Capabilities we’re interested in, but will welcome a more expansive
response:
* host a service remotely always and/or during an attack
* detect and alert of an attack
* scrub traffic
* work with major ISPs to coordinate mitigation
* DNS services
* layer 7-aware firewall/scrubbing

Please plan to include details such as:
* mechanisms supported for announcing prefixes for a scrubbing service
(e.g., BGP signaling)
* attack/service dashboard
* on-boarding process
* capacity
* how are SSL sessions proxied (who supplies keys, etc.)

Regards,

--
Karl Newell
Cyberinfrastructure Security Engineer
Internet2
520-344-0459

BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Microsoft Corporation//Outlook for Mac MIMEDIR//EN
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Arizona
X-ENTOURAGE-CFTIMEZONE:America/Phoenix
X-ENTOURAGE-TZID:70
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0700
DTSTART:16010101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:4365119B-09DD-4684-84CE-2790F8627585
X-ENTOURAGE_UUID:4365119B-09DD-4684-84CE-2790F8627585
DTSTAMP:20160126T204034Z
DTSTART;TZID=Arizona:20160204T130000
DTEND;TZID=Arizona:20160204T140000
LAST-MODIFIED:20160126T211118Z
SUMMARY:A10 DDoS Mitigation Presentation
DESCRIPTION:A10 Networks will be presenting their DDoS mitigation
  capabilities to\nour group on Thursday\, February 4 from 3pm - 4pm ET.
   Adobe connect will be\nused for the presentation\, which will also be
  recorded for any working\ngroup members unable to attend.\n\nTo join the
  meeting:\n			        \nhttp://internet2.acrobat.com/venus/\n\nIf you
  have never attended a Connect Pro meeting before:\n			      Test your
  connection:\nhttp://internet2.acrobat.com/common/help/en/support/meeting_
 test.htm\n\n			      Get a quick
  overview:\nhttp://www.adobe.com/products/adobeconnect.html\n\n\nPresentin
 g for A10 Networks will be:\n\nErik Cooper\nRegional Sales Director\nA10
  Networks\nDC\, VA\, WV\, NC\, & SC\nM - 301.801.1765\nPete Kowalsky\nSr
  Systems Engineer — Mid-Atlantic\nA10 Networks\nM –
  703.829.0910\nAhmad Nassiri\nA10
  Networks\\n\n\n\nPotential topics to be covered
  including but not limited to are:\n\nDescribe how your service addresses
  the following attacks against a\nuniversity or regional network:\n* DDoS
  attacks that result in a high volume of inbound traffic (greater\nthan
  10Gb/s) and disrupt both the targeted services as well as the\noperation
  of the network itself.\n* Persistent DDoS attacks against key services
  or infrastructure (DNS\, key\nweb server\, VPN\, etc.)\n\nCapabilities
  we¹re interested in\, but will welcome a more expansive\nresponse:\n*
  host a service remotely always and/or during an attack\n* detect and
  alert of an attack\n* scrub traffic\n* work with major ISPs to
  coordinate mitigation\n* DNS services\n* layer 7-aware
  firewall/scrubbing\n\nPlease plan to include details such as:\n*
  mechanisms supported for announcing prefixes for a scrubbing
  service\n(e.g.\, BGP signaling)\n* attack/service dashboard\n*
  on-boarding process\n* capacity\n* how are SSL sessions proxied (who
  supplies keys\, etc.)\n
ORGANIZER:MAILTO:
SEQUENCE:0
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MICROSOFT-CDO-INSTTYPE:0
BEGIN:VALARM
ACTION:DISPLAY
DESCRIPTION:REMINDER
TRIGGER;RELATED=START:-PT00H15M00S
END:VALARM
END:VEVENT
END:VCALENDAR


  • [Security-WG] Reminder: A10 DDoS Presentation Thurs Feb 4 3pm-4pm ET, Karl Newell, 02/04/2016

Archive powered by MHonArc 2.6.16.

Top of Page