[c-nsp] Best practise/security design for BGP and OSPF
CiscoNSP List
CiscoNSP_list at hotmail.com
Thu May 25 07:28:44 EDT 2017
Thanks very much Saku - Ive googled, but not found anything confirming...but ttl sec check under ospf, would it cause any issues with rLFA/FRR...i.e dynamic creation of tunnels?
Cheers.
________________________________
From: Saku Ytti <saku at ytti.fi>
Sent: Thursday, 25 May 2017 7:23 PM
To: CiscoNSP List
Cc: adamv0025 at netconsultings.com; cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] Best practise/security design for BGP and OSPF
On 25 May 2017 at 05:25, CiscoNSP List <CiscoNSP_list at hotmail.com> wrote:
Hey,
> but not XE? Regarding TTL....(In both OSPF and BGP)....hop count can be
> arbitrary, if we encounter a link failure...do we just use worse case
In iBGP yes, in eBGP and OSPF usually no. Typical design guarantees
eBGP and OSPF to be on-link or down.
--
++ytti
More information about the cisco-nsp
mailing list