From: Loc Pham (loc.pham@comcast.net)
Date: Sun Dec 04 2005 - 13:24:13 GMT-3
  Serge, search the GS archive for subject :
Redistribution - Limiting the damage 
 by Bruce Caslow
 I actually have one printout and post next to my rack !!!
 HTH, 
 lP
> Hi all,
>    
>   I'm always afraid when it comes to spoting mutual redistribution loops !!
>   What are the rules of tumbs for visualising the potential loops ?
>   What is the logic behind this ?
>   Does packet tagging always block the redistribution loops ?
>   what is the implementation logic ?
>    
>   Thx for your answers !
> 
> 
> 
> Serge R. N'GBESSO
> serge.ngbesso@bnpparibas.com
> Security Consultant
> CCDA, CCSP, CCIE:Security,
> Certified Etichal Hacker.
> www.1000club.com/club/japon/
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 		
> ---------------------------------
>  Appel audio GRATUIT partout dans le monde avec le nouveau Yahoo! Messenger
>  Tilichargez le ici !  
> 
> _______________________________________________________________________
> Subscription information may be found at: 
> http://www.groupstudy.com/list/CCIELab.html
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3