I currently have the following scenario/topology:
- 2 Catalyst 6509 with Sup1A/MSFC/PFC interconnected with each other (HSRP configured for client's high availability). This switches acts as part of our backbone;
- Several clients connected to Catalysts (most of them with physical redundancy);
Recently, our entire infrastructure has been affected with an attack originated in one of the clients (HSRP flapping, slow networks, etc...). I can't confirm what kind of attack we was dealing but this attack generated 100Mbps of traffic into the infrastructure (note that the uplink of this client is one 100Mbps port of the switch). When we disabled the ports that connect the backbone to the client's switch, everything has normalized!
So, here goes my question:
- Applying QoS strategies (such as policing) to drop traffic on problematic or suspiscious ports can be considered a "best practice" for this situation? Or what can be done to reduce the impacts in situations like this?
Just to make things easier, we don't have budget to implement any hardware and/or software this time...