Jack,

Because the architecture that we used is now in production with our hosted AC servers, I won't lay it out in detail here, as that makes it easier for would-be bad actors.

For the Providers out there that have the interest and inclination, I am thinking about writing up a How-To that they can use on commodity equipment, and doesn't require a Cisco firewall and matching Cisco engineer. smile

The design approach comes from pouring over firewall logs, and knowing how most edge-attacks are mounted.

In the near term, I can give you the essentials, you'll just need to map those to what the capabilities are of your existing equipment.

If you are so inclined, just drop me a Private Message (PM), and I'll get back to you later this week. Right now I am a bit under the production gun, as we have several other instances to spin up.


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed