[43410] in North American Network Operators' Group
Filtering Best Practices, et al (Was Verio Peering, Gordon's Knot)
daemon@ATHENA.MIT.EDU (Grant A. Kirkwood)
Tue Oct 9 10:41:41 2001
Message-ID: <3BC3108B.3C3FC383@virtical.net>
Date: Tue, 09 Oct 2001 07:58:19 -0700
From: "Grant A. Kirkwood" <grant@virtical.net>
Reply-To: grant@virtical.net
MIME-Version: 1.0
To: nanog@merit.edu
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu
Not to beat an already-decaying horse, BUT...
I'm currently in the process of setting up a new border router, and the
recent debate on the above topic got me wondering what the best practice
filtering policy is? Is there one?
And what do people put in place in terms of anti-spoofing ACLs and such?
There's a wealth of information on these topics, but no real consensus.
Or am I just reopening an ugly can of worms here?
TIA,
--
Grant A. Kirkwood - grant@virtical.net
Chief Technology Officer - Virtical Solutions, Inc.
http://www.virtical.net/