[149511] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DOS ATTACK ON BGP , LPTS ??

daemon@ATHENA.MIT.EDU (Peter Ehiwe)
Tue Feb 7 01:53:10 2012

In-Reply-To: <D2155AE4-2A2A-46F4-A0AC-C2007B8DAAB2@arbor.net>
Date: Tue, 7 Feb 2012 07:52:20 +0100
From: Peter Ehiwe <peterehiwe@gmail.com>
To: "Dobbins, Roland" <rdobbins@arbor.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Thanks Roland,
Does anyone have a recommended value for tuning LPTS based on experience ?
Rgds
Peter

On Tue, Feb 7, 2012 at 7:45 AM, Dobbins, Roland <rdobbins@arbor.net> wrote:

>
> On Feb 7, 2012, at 1:43 PM, Peter Ehiwe wrote:
>
> > What is the attacker spoofs the correct peering address ,
>
> In that case, work with your peer(s) to get them to deploy anti-spoofing
> filters at their edges.
>
> > then iACL may not suffice , from experience is the default policer
> values for LPTS enough for XR routers
>
> Hard to say - look at CoPP/LPTS tuning.
>
> -----------------------------------------------------------------------
> Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
>
>                The basis of optimism is sheer terror.
>
>                          -- Oscar Wilde
>
>


-- 
Warm Regards

Peter(CCIE 23782).

home help back first fref pref prev next nref lref last post