Revised BGP Maximum Prefix Limits Outbound
draft-sas-idr-maxprefix-outbound-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Melchior Aelmans , Massimiliano Stucchi , Job Snijders | ||
Last updated | 2021-08-22 (Latest revision 2021-02-18) | ||
Replaces | draft-sa-idr-maxprefix | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document updates RFC4271 by adding a control mechanism which limits the negative impact of outbound route leaks (RFC7908) in order to prevent resource exhaustion in Border Gateway Protocol (BGP) implementations.
Authors
Melchior Aelmans
Massimiliano Stucchi
Job Snijders
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)