2011
DOI: 10.17487/rfc6439
|View full text |Cite
|
Sign up to set email alerts
|

Routing Bridges (RBridges): Appointed Forwarders

Abstract: The IETF TRILL (TRansparent Interconnection of Lots of Links) protocol provides least cost pair-wise data forwarding without configuration in multi-hop networks with arbitrary topology, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and multicast traffic. TRILL accomplishes this by using IS-IS (Intermediate System to Intermediate System) link state routing and by encapsulating traffic using a header that includes a hop count. Devices that implement TRILL ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…This document replaces and obsoletes [RFC6439], incorporating the former material in [RFC6439] with these additions. The various optimizations are orthogonal and optional.…”
Section: Trill: Appointed Forwardersmentioning
confidence: 99%
“…This document replaces and obsoletes [RFC6439], incorporating the former material in [RFC6439] with these additions. The various optimizations are orthogonal and optional.…”
Section: Trill: Appointed Forwardersmentioning
confidence: 99%
“…The Designated RBridge (DRB) on a link uses the Appointed Forwarders sub-TLV to inform other ISs on the link that they are the designated VLAN-x forwarder for one or more ranges of VLAN IDs as specified in [RFC6439]. It has the following format: o Length: 6*n bytes, where there are n appointments.…”
Section: Appointed Forwarders Sub-tlvmentioning
confidence: 99%
“…Assume S is an end station attached to RB1 trying to spoof a target end station T and that T is attached to RB2. Perhaps S wants to steal traffic intended for T or forge traffic as if it was from T. With that default TRILL data-plane learning as described in [RFC6325], S can impersonate T or any other end station in the same Data Label (VLAN or FGL [FGL]) as S and possibly other Data Labels, depending on how tightly VLAN admission and Appointed Forwarders [RFC6439] are configured at the port by which S is connected to RB1. S can just send native frames with the forged source MAC addresses of T, perhaps broadcast frames for maximum effectiveness.…”
Section: Security Considerationsmentioning
confidence: 99%