[130308] in North American Network Operators' Group
Re: Using crypto auth for detecting corrupted IGP packets?
daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Fri Oct 1 03:17:33 2010
From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Fri, 1 Oct 2010 07:14:53 +0000
In-Reply-To: <AANLkTi=A0q7xp5ARVjbaR4vi8CKu1rZUKJar60zoY4CC@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Oct 1, 2010, at 11:07 AM, Manav Bhatia wrote:
> Buffering for 4-6 hours worth of control traffic is HUGE!=20
If 4-6 hours of *control-plane* traffic on a given device is 'HUGE!', for s=
ome reasonable modern value of 'HUGE!', then there's definitely a problem o=
n the network in question.
;>
-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Sell your computer and buy a guitar.