[c-nsp] Best practise/security design for BGP and OSPF

CiscoNSP List CiscoNSP_list at hotmail.com
Thu May 25 07:28:44 EDT 2017


Thanks very much Saku - Ive googled, but not found anything confirming...but ttl sec check under ospf, would it cause any issues with rLFA/FRR...i.e dynamic creation of tunnels?

Cheers.

________________________________
From: Saku Ytti <saku at ytti.fi>
Sent: Thursday, 25 May 2017 7:23 PM
To: CiscoNSP List
Cc: adamv0025 at netconsultings.com; cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] Best practise/security design for BGP and OSPF

On 25 May 2017 at 05:25, CiscoNSP List <CiscoNSP_list at hotmail.com> wrote:

Hey,

> but not XE?  Regarding TTL....(In both OSPF and BGP)....hop count can be
> arbitrary, if we encounter a link failure...do we just use worse case

In iBGP yes, in eBGP and OSPF usually no. Typical design guarantees
eBGP and OSPF to be on-link or down.

--
  ++ytti


More information about the cisco-nsp mailing list