[73135] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: BGP-based blackholing/hijacking patented in Australia?

daemon@ATHENA.MIT.EDU (Barry Raveendran Greene)
Fri Aug 13 11:00:12 2004

From: "Barry Raveendran Greene" <bgreene@cisco.com>
To: "'Edward B. Dreger'" <eddy+public+spam@noc.everquick.net>,
	<nanog@merit.edu>
Date: Fri, 13 Aug 2004 08:01:06 -0700
In-Reply-To: <Pine.LNX.4.44.0408131317280.5114-100000@a.mx.ict1.everquick.net>
Errors-To: owner-nanog-outgoing@merit.edu


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> I've admittedly not read the entire thread, but 
> Squid+GRE+WCCP comes to mind.  That combination has been 
> around more than six months.

Yep - WCCPv2 can be BGP triggered via a community. So you can have a
bunch of devices (not just web) on a WCCPV2 service group sitting on
the edge in standby mode. Kick out a BGP Community and you now have
traffic heading over to the now active WCCPv2 service group.

The industry has come up with lots of ways to do things like this. 

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQRzXSr/UEA/xivvmEQJ53gCgqAQOyLWzLvkQpZJVJv3Bq1X/Q6oAoLMF
8TB1OsStsVW95iZO8nAZrOEd
=ibpR
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post