From: Serge N'GBESSO (sergeng@yahoo.fr)
Date: Sun Dec 04 2005 - 11:23:31 GMT-3
Hi all,
I'm always afraid when it comes to spoting mutual redistribution loops !!
What are the rules of tumbs for visualising the potential loops ?
What is the logic behind this ?
Does packet tagging always block the redistribution loops ?
what is the implementation logic ?
Thx for your answers !
Serge R. N'GBESSO
serge.ngbesso@bnpparibas.com
Security Consultant
CCDA, CCSP, CCIE:Security,
Certified Etichal Hacker.
www.1000club.com/club/japon/
---------------------------------
Appel audio GRATUIT partout dans le monde avec le nouveau Yahoo! Messenger
Tilichargez le ici !
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3