<<< Chronological >>> | Author Index Subject Index | <<< Threads >>> |
RE: [spoofing-tf] Preparing for anti-spoofing project at $fooBig carrier
- To: "Gert Doering" [email protected], "Martin Hannigan" [email protected]
- From: "Barry Greene \(bgreene\)" [email protected]
- Date: Tue, 17 Oct 2006 03:53:29 -0700
- Authentication-results: sj-dkim-2.cisco.com; [email protected] dkim=pass ( sig from cisco.com verified; );
- Dkim-signature: a=rsa-sha1; q=dns; l=384; t=1161082410; x=1161946410; c=relaxed/simple; s=sjdkim2002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; [email protected] z=From:=22Barry=20Greene=20\(bgreene\)[email protected] |Subject:RE=3A=20[spoofing-tf]=20Preparing=20for=20anti-spoofing=20project=20at=2 0$fooBig=20carrier; X=v=3Dcisco.com=3B=20h=3DEzFmJUPZ/a0Dh872zQJxRIMlCAI=3D; b=W6xzT2XLRbGA3A7jzVy6jD8VRbRKc88/ALBcw0tEWcy+ny1gVL9SVrsaXbsJbuqrSlPL17uR WG6pZ55l2gF7zMiLYEv1KqBIqC1jWZtmDUmFJr03k3q1qCrYFuHYHwaz;
> Don't enable ingress filtering on backbone links with > asymmetric traffic. > > This is something for the customer edge. You making "ingress filtering" = uRPF. uRPF is one of many techniques to do ingress filtering. It is one of many techniques to do BCP 38. Please do protect your network on the peering and multihoming edges. SPs get attacked.
- Re: [spoofing-tf] Preparing for anti-spoofing project at $fooBig carrier
- From: Gert Doering
<<< Chronological >>> | Author Subject | <<< Threads >>> |