Usage of IP Access control
-
~2 weeks ago I started to regularly pick IP addresses from the firewall log and adding them to the Access control. Against my expectations, the big part of these addresses seems to be rather static, and the FW log has become considerably “cleaner” (I’ve set the blocked IP addresses to not appear in the log).
But nevertheless the IP block list is slowly growing, of course. Is there any significant penalty having too much IPs in the block list, computingwise, resourcewise?
In theory, I think it should be less expensive to block attacks via the IP access control than through the various detection mechanisms. Is this correct?
Thanks,
Tom
- The topic ‘Usage of IP Access control’ is closed to new replies.