From: Loc Pham (loc.pham@comcast.net)
Date: Sun Dec 04 2005 - 13:24:13 GMT-3
Serge, search the GS archive for subject :
Redistribution - Limiting the damage
by Bruce Caslow
I actually have one printout and post next to my rack !!!
HTH,
lP
> Hi all,
>
> I'm always afraid when it comes to spoting mutual redistribution loops !!
> What are the rules of tumbs for visualising the potential loops ?
> What is the logic behind this ?
> Does packet tagging always block the redistribution loops ?
> what is the implementation logic ?
>
> Thx for your answers !
>
>
>
> Serge R. N'GBESSO
> serge.ngbesso@bnpparibas.com
> Security Consultant
> CCDA, CCSP, CCIE:Security,
> Certified Etichal Hacker.
> www.1000club.com/club/japon/
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ---------------------------------
> Appel audio GRATUIT partout dans le monde avec le nouveau Yahoo! Messenger
> Tilichargez le ici !
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3