Revised BGP Maximum Prefix Limits Outbound
draft-sas-idr-maxprefix-outbound-02
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | Melchior Aelmans , stucchi-lists@glevia.com , Job Snijders | ||
Last updated | 2021-08-22 (Latest revision 2021-02-18) | ||
Replaces | draft-sa-idr-maxprefix | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
|
||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-sas-idr-maxprefix-outbound-02.txt
Abstract
This document updates RFC4271 by adding a control mechanism which limits the negative impact of outbound route leaks (RFC7908) in order to prevent resource exhaustion in Border Gateway Protocol (BGP) implementations.
Authors
Melchior Aelmans
stucchi-lists@glevia.com
Job Snijders
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)