After we prove the CPU utilization can be easily increased by anyone anytime (as shown in the previous blog post, “Protect the Control Plane – part 1, trivial attack.”), I feel obliged to show how to quickly prevent the cause of potential network and services damage.