||Recovery from Network Misuse via Invalid Source Addresses: Upon discovering the misuse or unauthorized use of the network, Service Providers should shut down the port in accordance with AUP (Acceptable Use Policy) and clearance from legal counsel. Review ACL (Access Control List) and temporarily remove offending address pending legal review and reactivate the port after the threat has been mitigated.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Service Provider; Network Operator
||Cyber Security;Disaster Recovery;Emergency Preparedness;Intrusion Detection;
||IETF rfc3013 sections 4.3 and 4.4. NANOG ISP Resources. www.IATF.net.