Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.
Apply hardware rate limiter features to limit packets requiring processing by the device's CPU in order to mitigate denial-of-service (DoS) attacks. See your vendor's documentation for specific configuration instructions. For hardware rate limiting configuration details, consult the Cisco Catalyst 6500 Denial of Service (DoS) Protection Configuration Guide
The Cisco Applied Intelligence team has created the following companion document to guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software: Identifying and Mitigating Exploitation of the Cisco IOS Software IP Service Level Agreement Vulnerability
Administrators are advised to monitor affected systems.