BGP Maximum Prefix Limits Inbound
draft-sas-idr-maxprefix-inbound-03
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Melchior Aelmans , stucchi-lists@glevia.com , Job Snijders | ||
| Last updated | 2021-12-18 (Latest revision 2021-06-16) | ||
| Replaces | draft-sa-idr-maxprefix | ||
| Stream | (None) | ||
| Formats |
Expired & archived
plain text
xml
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-sas-idr-maxprefix-inbound-03.txt
Abstract
This document describes mechanisms to limit the negative impact of route leaks [RFC7908] and/or resource exhaustion in BGP [RFC4271] implementations.
Authors
Melchior Aelmans
stucchi-lists@glevia.com
Job Snijders
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)