[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Using crypto auth for detecting corrupted IGP packets?
>
> I really wish there was a good way to (generically) keep a 4-6 hour buffer of all control-plane traffic on devices. While you can do that with some, the forensic value is immense when you have a problem.
>
Buffering for 4-6 hours worth of control traffic is HUGE! What about
mirroring your control traffic arriving on your network ports to some
other dedicated port?
Manav