From: Jaycee Cockburn - BCX SS (Jaycee.Cockburn@bcx.co.za)
Date: Thu Nov 10 2005 - 07:57:00 GMT-3
Hi D,
If you set it to non-broadcast it would just be converted to unicast,
thus it would be possible for a person with a sniffer to get those
packets too...I think they are leaning towards not sending out any OSPF
packets from that interface, but still to be active in the router
process...might be wrong, but that's how I would interpret...
Cheers
JC
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
De Witt, Duane
Sent: 10 November 2005 12:46 PM
To: Cisco certification
Subject: OSPF Hello's
Hi Group
In IEWB V2 Lab4 5.13-15:
Do not allow hosts in VLAN3 to intercept R3's OSPF hello packets and do
not use passive-interface.
The suggested solution is an access-list on SW2 to deny OSPF on R3's
interface.
Would another solution be to set the FE interface on R3 to
non-broadcast?
Regards
Duane
____________________________________________
SIEMENS Siemens Business Services
Siemens Service Center
126 14th Road
Erand Gardens
Midrand
South Africa
* +27 11 5452555
* +27 83 4452768
* +27 11 5415219
* duane.dewitt@siemens.com <mailto:duane.dewitt@siemens.com>
This archive was generated by hypermail 2.1.4 : Thu Dec 01 2005 - 09:12:06 GMT-3