Skip to main content

Protecting The Router Control Plane
draft-dugal-opsec-protect-control-plane-02

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors David Dugal , Carlos Pignataro , Rodney Dunn
Last updated 2010-07-06 (Latest revision 2010-02-23)
Replaced by draft-ietf-opsec-protect-control-plane
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-opsec-protect-control-plane
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This memo provides a method for protecting a router's control plane from undesired or malicious traffic. In this approach, all legitimate control plane traffic is identifed. Once legitimate traffic has been identified, a filter is deployed on the router's forwarding plane. That filter prevents traffic not specifically identified as legitimate from reaching the router's control plane.

Authors

David Dugal
Carlos Pignataro
Rodney Dunn

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)