|
Cisco Secure DDoS Edge Protection
|
Release 25.4.1
|
Introduced in this release on: Fixed Systems (8010 [ASIC: A100])(select variants only*)
*This feature is supported on the Cisco 8011-32Y8L2H2FH routers.
|
|
Cisco Secure DDoS Edge Protection
|
Release 25.2.1
|
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100], 8010 [ASIC: A100]) (select
variants only*); Centralized Systems (8600 [ASIC: Q200]); Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) (select variants
only*)
You can now enable the router to detect DDoS attacks targeting MPLS traffic using DDoS edge protection. The router analyzes
MPLS flows to identify malicious traffic patterns, ensuring the availability and performance of services traversing MPLS networks.
|
|
Cisco Secure DDoS Edge Protection
|
Release 25.1.1
|
Introduced in this release on: Fixed Systems (8700 [ASIC: K100], 8010 [ASIC: A100])(select variants only*)
*This feature is supported on:
-
8712-MOD-M
-
8011-4G24Y4H-I
|
|
Cisco Secure DDoS Edge Protection
|
Release 24.4.1
|
Introduced in this release on: Fixed Systems (8200 [ASIC: P100], 8700 [ASIC: P100])(select variants only*); Modular Systems (8800 [LC ASIC: P100])(select variants only*)
*This feature is supported on:
-
8212-48FH-M
-
8711-32FH-M
-
88-LC1-36EH
-
88-LC1-12TH24FH-E
-
88-LC1-52Y8H-EM
|
|
Cisco Secure DDoS Edge Protection
|
Release 24.1.1
|
You can now efficiently block malicious traffic, safeguarding your network's performance and availability. This is achieved
as we have implemented protection against distributed denial-of-service (DDoS) attacks at the network edge, strategically
deployed at the ingress point where external network traffic enters.
A centralized controller manages DDoS mitigation capabilities using information from a collection of detectors deployed on
the routers. These detectors analyze IPv4 and IPv6 traffic in real-time to identify DDoS attacks. Upon detection, the controller
enforces deny ACLs to block malicious traffic while allowing legitimate traffic.
This local inspection enhances visibility, speeds up response times, and optimizes the network without the need for additional
hardware or attack traffic redirection.
|