One assumption that is being made is that all hosts are trying to communicate 
through a router. There are many networks that hosts only talk to each other. 
Looking at ND tables or flows in a router is not viable for these networks.

True network discovery like security, relies on multiple mechanism. Not one 
mechanism fits all. Active discovery is one of the key elements. Passive 
monitoring (e.g. ND tables, MLD joins, DAD monitoring) is another. 

Some network administrators may determine that responses to all-hosts ping is 
reasonable, others may not. Having all hosts contain the code for responding 
gives the network administrators the choice. Without it, they have no choice.

The same is true for Inverse ND. Requiring that it be implemented gives them 
the choice to use it or disable it.

-----Original Message-----
From: Christian Huitema [mailto:[EMAIL PROTECTED]
Sent: Wednesday, August 03, 2005 4:07
To: Mark Smith; Pashby, Ronald W CTR NSWCDD-B35
Cc: ipv6@ietf.org
Subject: RE: FW: Re: about draft-pashby-ipv6-network-discovery-00.txt


> Only if they respond to the multicast echo request.

Reality check: by default, host firewalls drop incoming echo requests.
An explicit design goal of these firewalls is to make the host
"stealthy", i.e. make sure the host is only detected by parties with
which the host decide to communicate.

I don't believe that polling protocols can reliably provide inventory.
If you really want inventory, you probably will have better luck with a
layer 2 access control protocol (802.1x), or by using a router based
tool to monitor flows going in and out of the network.

-- Christian Huitema

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to