Using crypto auth for detecting corrupted IGP packets?

Manav Bhatia manavbhatia at gmail.com
Fri Oct 1 05:37:58 UTC 2010


>
> I really wish there was a good way to (generically) keep a 4-6 hour buffer of all control-plane traffic on devices. While you can do that with some, the forensic value is immense when you have a problem.
>

Buffering for 4-6 hours worth of control traffic is HUGE! What about
mirroring your control traffic arriving on your network ports to some
other dedicated port?

Manav




More information about the NANOG mailing list