[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Using crypto auth for detecting corrupted IGP packets?



>
> I really wish there was a good way to (generically) keep a 4-6 hour buffer of all control-plane traffic on devices. While you can do that with some, the forensic value is immense when you have a problem.
>

Buffering for 4-6 hours worth of control traffic is HUGE! What about
mirroring your control traffic arriving on your network ports to some
other dedicated port?

Manav