Datasheet
Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 10
The Cisco Traffic Anomaly Detector Module can be installed in either integrated or dedicated
mode, imposing either a one- or two-step packet-capture process to receive a copy of traffic for
monitoring. Whether in integrated or dedicated mode, when an attack is detected, the Traffic
Anomaly Detector Module responds in one of three ways—it can send an alert to initiate a manual
response, it can trigger an existing management system to take action, or it can automatically
launch the Cisco Anomaly Guard Module or Cisco Guard XT appliance to immediately begin
mitigation services.
Applications
Cisco DDoS anomaly detection and mitigation solutions can be deployed in various topologies
serving both enterprises and service provider environments (Figures 3–5).
Figure 3. Cisco DDoS Anomaly Detection and Mitigation in Enterprise or Hosting Data Center