[43410] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Filtering Best Practices, et al (Was Verio Peering, Gordon's Knot)

daemon@ATHENA.MIT.EDU (Grant A. Kirkwood)
Tue Oct 9 10:41:41 2001

Message-ID: <3BC3108B.3C3FC383@virtical.net>
Date: Tue, 09 Oct 2001 07:58:19 -0700
From: "Grant A. Kirkwood" <grant@virtical.net>
Reply-To: grant@virtical.net
MIME-Version: 1.0
To: nanog@merit.edu
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


Not to beat an already-decaying horse, BUT...

I'm currently in the process of setting up a new border router, and the
recent debate on the above topic got me wondering what the best practice
filtering policy is? Is there one?

And what do people put in place in terms of anti-spoofing ACLs and such?
There's a wealth of information on these topics, but no real consensus.

Or am I just reopening an ugly can of worms here?

TIA,

-- 
Grant A. Kirkwood - grant@virtical.net
Chief Technology Officer - Virtical Solutions, Inc.
http://www.virtical.net/

home help back first fref pref prev next nref lref last post