nanog mailing list archives
Re: Using crypto auth for detecting corrupted IGP packets?
From: Manav Bhatia <manavbhatia () gmail com>
Date: Fri, 1 Oct 2010 11:07:58 +0530
I really wish there was a good way to (generically) keep a 4-6 hour buffer of all control-plane traffic on devices. While you can do that with some, the forensic value is immense when you have a problem.
Buffering for 4-6 hours worth of control traffic is HUGE! What about mirroring your control traffic arriving on your network ports to some other dedicated port? Manav
Current thread:
- Using crypto auth for detecting corrupted IGP packets? Manav Bhatia (Sep 30)
- Re: Using crypto auth for detecting corrupted IGP packets? Christopher Morrow (Sep 30)
- Re: Using crypto auth for detecting corrupted IGP packets? Danny McPherson (Sep 30)
- Re: Using crypto auth for detecting corrupted IGP packets? Jared Mauch (Sep 30)
- Re: Using crypto auth for detecting corrupted IGP packets? Manav Bhatia (Sep 30)
- Re: Using crypto auth for detecting corrupted IGP packets? Jared Mauch (Sep 30)