nanog mailing list archives

Re: Using crypto auth for detecting corrupted IGP packets?


From: Manav Bhatia <manavbhatia () gmail com>
Date: Fri, 1 Oct 2010 11:07:58 +0530


I really wish there was a good way to (generically) keep a 4-6 hour buffer of all control-plane traffic on devices. 
While you can do that with some, the forensic value is immense when you have a problem.


Buffering for 4-6 hours worth of control traffic is HUGE! What about
mirroring your control traffic arriving on your network ports to some
other dedicated port?

Manav


Current thread: