[27166] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo! Lessons Learned

daemon@ATHENA.MIT.EDU (Dan Hollis)
Wed Feb 9 20:13:58 2000

Date: Wed, 9 Feb 2000 17:09:36 -0800 (PST)
From: Dan Hollis <goemon@sasami.anime.net>
To: Brandon Ross <bross@mindspring.net>
Cc: nanog@nanog.org
In-Reply-To: <Pine.LNX.3.96.1000209191208.16851D-100000@xymox.netops.mindspring.net>
Message-ID: <Pine.LNX.4.10.10002091708260.4331-100000@anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 9 Feb 2000, Brandon Ross wrote:
> On Wed, 9 Feb 2000, Chris Cappuccio wrote:
> > Funny.  On an as5300 with compression turned on, and 96 56K users dialed up
> > and active, I've never seen the CPU load go above 15%
> And we have anti-spoofing filters on for all of the 3com TC's that we own,
> and we don't see any performance hit.

Maybe its time for a spoofing-source registry similar to the smurf-amp
registry. Eg networks which allow spoofing to originate from them

-Dan



home help back first fref pref prev next nref lref last post