Dear OpenBSD-Misc,

First of all, awesome work on the OpenBGPd and BFD code. I'm working on a
WAN setup for an enterprise and we are migrating from static route WAN to a
full fledge BGP transit in a multi home environment for the specific
purpose of providing the best possible path/route to our service catalogue.
The service catalogue within the enterprise is orchestrated by a private
vmware cloud with added software defined networking (micro-segmentation)
capabilities within the private cloud via NSX.

My concern is about DDoS protection from the ingress traffic, in my logic
it makes no sense to contract a service such as Imperva or Cloudflare as
DDoS protection on the network level, as  proper PF (firewall) rules in
place should protect us at line rate. My doubts are:

- Are the rules provided for anti-ddos sufficient? Is there a good soul to
share some rulesets?
- Am I out of my mind for choosing OpenBGPd/OpenBSD for my transit WAN? I
love the fact that we're sandboxed and hyperthreaded and am particularly
content with the resolution of convergence time problems (
http://undeadly.org/cgi?action=article&sid=20151106171337&mode=expanded)
- Is there a way to contract a support in case sh*t hits the fan with
OpenBGPd?
- What are the best tools to supervise and test bed the performance of an
OpenBGPd instance? (most the definately the dumbest question)

Again, love the fact I can get some sleep with OpenBSD/OpenBGPd, please do
get back to me for commercial support to calm the nerves.

Sincerely,

Uday MOORJANI

Reply via email to