[36400] in North American Network Operators' Group
Re: AS Leakage
daemon@ATHENA.MIT.EDU (Jared Mauch)
Wed Apr 4 16:44:23 2001
Date: Wed, 4 Apr 2001 16:32:14 -0400
From: Jared Mauch <jared@puck.Nether.net>
To: John Fraizer <nanog@Overkill.EnterZone.Net>
Cc: Christian Nielsen <cnielsen@nielsen.net>,
Travis Pugh <tpugh@shore.net>, Nanog mailing list <nanog@merit.edu>
Message-ID: <20010404163214.F13904@puck.nether.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21.0104041601470.8024-100000@Overkill.EnterZone.Net>; from nanog@Overkill.EnterZone.Net on Wed, Apr 04, 2001 at 04:03:07PM -0400
Errors-To: owner-nanog-outgoing@merit.edu
On Wed, Apr 04, 2001 at 04:03:07PM -0400, John Fraizer wrote:
>
> On Wed, 4 Apr 2001, Christian Nielsen wrote:
>
> > filtered. We saw providers leaking exchange point blocks, so we filtered.
> > we dont want to see _701_ from sprint or anyone except _701_, so we
> > filter. we do this for other large providers.
> >
>
> That's strange. Your 701 connection goes down and you've filtered any
> backup route you had into them. Good thinking.
I always local-prefed paths to other upstreams down via a
specific upstream in my 2x removed previous life.
made traffic flow the "best" path and was useful when you had
a connection (but not directly to ANS, one of their "sub AsES") w/ ANS
and wanted to insure that traffic to ANS went over your ANS link instead
of via 1239, 701, or 3561 because of as-path win/tiebreak.
- jared
--
Jared Mauch | pgp key available via finger from jared@puck.nether.net
clue++; | http://puck.nether.net/~jared/ My statements are only mine.