[73135] in North American Network Operators' Group
RE: BGP-based blackholing/hijacking patented in Australia?
daemon@ATHENA.MIT.EDU (Barry Raveendran Greene)
Fri Aug 13 11:00:12 2004
From: "Barry Raveendran Greene" <bgreene@cisco.com>
To: "'Edward B. Dreger'" <eddy+public+spam@noc.everquick.net>,
<nanog@merit.edu>
Date: Fri, 13 Aug 2004 08:01:06 -0700
In-Reply-To: <Pine.LNX.4.44.0408131317280.5114-100000@a.mx.ict1.everquick.net>
Errors-To: owner-nanog-outgoing@merit.edu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> I've admittedly not read the entire thread, but
> Squid+GRE+WCCP comes to mind. That combination has been
> around more than six months.
Yep - WCCPv2 can be BGP triggered via a community. So you can have a
bunch of devices (not just web) on a WCCPV2 service group sitting on
the edge in standby mode. Kick out a BGP Community and you now have
traffic heading over to the now active WCCPv2 service group.
The industry has come up with lots of ways to do things like this.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3
iQA/AwUBQRzXSr/UEA/xivvmEQJ53gCgqAQOyLWzLvkQpZJVJv3Bq1X/Q6oAoLMF
8TB1OsStsVW95iZO8nAZrOEd
=ibpR
-----END PGP SIGNATURE-----