
© 2005 Extreme Networks, Inc. All Rights Reserved
Protecting the Network: Illustration
Measure
Analyze
- Pre-Filter Data
- Maintain Counters
- Sample Flows
- ID Traffic bursts
- ID State Changes
- Baseline normal behavior
- Identify anomalies
- Generate alerts
Respond
- Shutdown Hosts
- Shutdown Ports
- Initiate detailed monitoring
- send data to mirror port
- Throttle large
movements of data
Enforce
- Deep & Extensive ACLs
- Rate Limiting
- Traffic Marking
Analysis
Engine
CLEAR-Flow for Interactive Threat Containment
Kommentare zu diesen Handbüchern