[179158] in North American Network Operators' Group
Re: BGP offloading (fixing legacy router BGP scalability issues)
daemon@ATHENA.MIT.EDU (Colin Johnston)
Thu Apr 2 04:11:11 2015
X-Original-To: nanog@nanog.org
From: Colin Johnston <colinj@gt86car.org.uk>
In-Reply-To: <551CF666.7090100@seacom.mu>
Date: Thu, 2 Apr 2015 09:07:23 +0100
To: Mark Tinka <mark.tinka@seacom.mu>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
> On 2 Apr 2015, at 08:57, Mark Tinka <mark.tinka@seacom.mu> wrote:
>=20
>=20
>=20
> On 2/Apr/15 09:52, Stefan Neufeind wrote:
>> Of course it's not something you should generalise about all people =
or
>> all traffic from certain countries. But it's obvious that there are =
some
>> countries which seem to care almost not at all about abuse or maybe =
even
>> are sources for planned hack-attempts. And at least some large ISPs
>> there seem to do nothing for their reputation or the reputation of =
their
>> country.
>=20
> So when your customer calls you to complain about not being able to
> reach a random destination in "certain countries", you would tell them
> that you made a conscious decision to block access to "certain
> countries" because of reasons the customer probably will never
> understand or appreciate?
>=20
Open ranges as necessary and mention will will reblock if bad traffic =
seen.
It is called protect what you know is good and allow bad if documented =
and check if does not cause problems
Colin