[36400] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: AS Leakage

daemon@ATHENA.MIT.EDU (Jared Mauch)
Wed Apr 4 16:44:23 2001

Date: Wed, 4 Apr 2001 16:32:14 -0400
From: Jared Mauch <jared@puck.Nether.net>
To: John Fraizer <nanog@Overkill.EnterZone.Net>
Cc: Christian Nielsen <cnielsen@nielsen.net>,
	Travis Pugh <tpugh@shore.net>, Nanog mailing list <nanog@merit.edu>
Message-ID: <20010404163214.F13904@puck.nether.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21.0104041601470.8024-100000@Overkill.EnterZone.Net>; from nanog@Overkill.EnterZone.Net on Wed, Apr 04, 2001 at 04:03:07PM -0400
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, Apr 04, 2001 at 04:03:07PM -0400, John Fraizer wrote:
> 
> On Wed, 4 Apr 2001, Christian Nielsen wrote:
> 
> > filtered. We saw providers leaking exchange point blocks, so we filtered.
> > we dont want to see _701_ from sprint or anyone except _701_, so we
> > filter. we do this for other large providers.
> > 
> 
> That's strange.  Your 701 connection goes down and you've filtered any
> backup route you had into them.  Good thinking.  

	I always local-prefed paths to other upstreams down via a
specific upstream in my 2x removed previous life.

	made traffic flow the "best" path and was useful when you had
a connection (but not directly to ANS, one of their "sub AsES") w/ ANS
and wanted to insure that traffic to ANS went over your ANS link instead
of via 1239, 701, or 3561 because of as-path win/tiebreak.

	- jared

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.


home help back first fref pref prev next nref lref last post