What is the difference? Does not the "campus network" provide a
service?
--
Be decisive. Make a decision, right or wrong. The road of life is
paved with flat squirrels who could not make a decision.
>-Original Message-
>From: cisco-nsp On Behalf Of Nick
>Hilliard
>Sent: Tuesday, 11
Not to mention the obvious observation that a firewall designed to "fail
open" must not have anything of any importance behind it, so it (the
firewall) merely exists for "checkbox compliance" with the checklists of
incompetent arseholes and clueless retards, and not because it serves
(or is inten
Absolutely. Make sure to add enough overhead, 25%, so you do not keep
getting warning messages in the logs.
These are the defaults for XR
To prevent a peer from flooding BGP with advertisements, a limit is
placed on the number of prefixes that are accepted from a peer for
each supported address fa
Yes this is a common practice to follow for extra security measures. In
the off chance a provider starts flooding your network with more than what
is required it will safe guard your network. You can set a slightly higher
warning threshold. Usually more prevalent in MPLS environments as there
ar
Hello Gentlemen,
I wanted to ask if this is common practice to apply Maximum prefix limit on
BGP neighborship with Internet providers from where you are getting the
entire routing table. I know its consider a best practice but want to know
if its also common.
If yes, what would be the max limit of
Yham wrote on 11/08/2020 04:33:
Thanks for your comments. I kinda agree with you on avoid using
transparent mode however not clear why you wouldn't want your
north-south traffic pass through perimeter security devices (FWs). how
would you protect your network from outside if you don't have fire
Hi,
On Mon, Aug 10, 2020 at 11:33:06PM -0400, Yham wrote:
> Thanks for your comments. I kinda agree with you on avoid using transparent
> mode however not clear why you wouldn't want your north-south traffic pass
> through perimeter security devices (FWs). how would you protect your
> network from