Looking for some ideas/suggestions around multi-tenanted vRF based WAN router security. So lets say you have MPLS edge that terminates on a high end router and is vRF based to segregate each customer into virtual routing tables. What security elements would you enable to prevent user X within vRF RED from attacking the shared router and performing a denial of service attack? The end goal is to protect the router with it being multi-tenanted. Some would say stick a pair of Cisco ASA5550’s behind the router(s) and present a context per customer per vRF. We've been looking at tcp-intercept, disabling all local service, locking down ssh etc.. Any ideas?
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...