[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
DOS ATTACK ON BGP , LPTS ??
- Subject: DOS ATTACK ON BGP , LPTS ??
- From: peterehiwe at gmail.com (Peter Ehiwe)
- Date: Tue, 7 Feb 2012 07:52:20 +0100
- In-reply-to: <[email protected]>
- References: <CADECfTUJZpgxECBh=6MGZjCejn83gW8rOpO3_t7hJCcJ+EcbFQ@mail.gmail.com> <[email protected]> <CADECfTUYsj+kz4xmWSjs2c7XPmK9mzH_tkBTNNWwTht0wdbQvw@mail.gmail.com> <[email protected]>
Thanks Roland,
Does anyone have a recommended value for tuning LPTS based on experience ?
Rgds
Peter
On Tue, Feb 7, 2012 at 7:45 AM, Dobbins, Roland <rdobbins at arbor.net> wrote:
>
> On Feb 7, 2012, at 1:43 PM, Peter Ehiwe wrote:
>
> > What is the attacker spoofs the correct peering address ,
>
> In that case, work with your peer(s) to get them to deploy anti-spoofing
> filters at their edges.
>
> > then iACL may not suffice , from experience is the default policer
> values for LPTS enough for XR routers
>
> Hard to say - look at CoPP/LPTS tuning.
>
> -----------------------------------------------------------------------
> Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
>
> The basis of optimism is sheer terror.
>
> -- Oscar Wilde
>
>
--
Warm Regards
Peter(CCIE 23782).