[172672] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cheap LSN/CGN/NAT444 Solution

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Mon Jun 30 06:12:32 2014

X-Original-To: nanog@nanog.org
From: Roland Dobbins <rdobbins@arbor.net>
In-Reply-To: <004701cf9449$1eebd850$5cc388f0$@wicks.co.nz>
Date: Mon, 30 Jun 2014 17:12:17 +0700
To: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org


On Jun 30, 2014, at 4:53 PM, Tony Wicks <tony@wicks.co.nz> wrote:

> =46rom experience (we ran out of IPv4 a long time ago in the APNIC =
region) this is not needed,

I've seen huge problems from compromised machines completely killing =
NATs from the southbound side.

> what is needed however is session timeouts.=20

This can help, but it isn't a solution to the botted/abusive machine =
problem.  They'll just keep right on pumping out packets and =
establishing new sessions, 'crowding out' legitimate users and filling =
up the state-table, maxing the CPU.  Embryonic connection limits and all =
that stuff aren't enough, either.

----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

                   Equo ne credite, Teucri.

    		   	  -- Laoco=F6n


home help back first fref pref prev next nref lref last post