So considering they're widely regarded as a criminal network hosting the
more dodgy/dangerous stuff on the net, surely we could 'protect' our
customers by blocking the 91.202.60.0/22 range?
Consider that can of worms opened :o)
Paul
-Original Message-
From: Jeffrey Lyon [mailto:jeffrey.l
Following on, the best way is to 'trust' on all uplinks between devices
and filter at the edge. So you have a customer who shouldn't be sending
tagged traffic, set the port to not trusted (should be the default
state) and any customer using QoS should have "mls qos trust dscp" on
the demark port.
If you only want 1gig, then if the SP provides it, won't it be cheaper
to simply get a 1gig circuit from them that hands off to you on a GigE
port rather than pay for all the various higher spec equipment that
you'd otherwise require?
Paul.
-Original Message-
From: Kevin Hodle [mailto:
I've just bought "IPv6 Essentials", however it turned out to be the 1st
edition, hopefully there won't be too many differences.
I'm also going to go through this PDF on the Cisco website that should
put a practical face on the book, which seems very theoretical on a
quick flick through ...
http:/
4 matches
Mail list logo