nanog mailing list archives
Re: Using crypto auth for detecting corrupted IGP packets?
From: "Dobbins, Roland" <rdobbins () arbor net>
Date: Fri, 1 Oct 2010 07:14:53 +0000
On Oct 1, 2010, at 11:07 AM, Manav Bhatia wrote:
Buffering for 4-6 hours worth of control traffic is HUGE!
If 4-6 hours of *control-plane* traffic on a given device is 'HUGE!', for some reasonable modern value of 'HUGE!', then there's definitely a problem on the network in question. ;> ----------------------------------------------------------------------- Roland Dobbins <rdobbins () arbor net> // <http://www.arbornetworks.com> Sell your computer and buy a guitar.
Current thread:
- Re: Using crypto auth for detecting corrupted IGP packets? Dobbins, Roland (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Manav Bhatia (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Dobbins, Roland (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Jared Mauch (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Christopher Morrow (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Dobbins, Roland (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Manav Bhatia (Oct 01)
- <Possible follow-ups>
- Re: Using crypto auth for detecting corrupted IGP packets? John Kristoff (Oct 01)
- Re: Using crypto auth for detecting corrupted IGP packets? Manav Bhatia (Oct 13)