| http://www.w3.org/ns/prov#value | - At the same time learning new, valid ND, entries didn't seem to be an issue.So although it is a problem in theory, it seems that most implementations, i.e. Cisco (as described by Strech) and Juniper limit the effects of such an attack.ReplyDeletePeteW08 June, 2011 14:25I like your thinking, I have been following this every since a design where we mapped 10.x.y.0/24 subnets by mapping the 2nd and 3rd
|