North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: On the back of other 'security' posts....
- From: Paul Vixie
- Date: Sun Aug 31 22:39:44 2003
> ... That depends on your definition of edge, I suppose. ...
in SAC 004 (http://www.icann.org/committees/security/sac004.txt) we see:
1 - Connection Taxonomy
1.1. The Internet is a "network of networks", where the component
networks are called Autonomous Systems (AS), each having a unique AS
1.2. Connections inside an AS are called "Interior" (or sometimes
"backbone"), and their security policies are set according to local
needs, usually based on business or technical requirements.
1.3. Connections between ASs are called "Border" (or sometimes
"peering"), and their security policies are set bilaterally according to
the joint needs of the interconnecting parties.
1.4. Connections between an AS and its traffic sources (generators) and
traffic sinks (consumers) are called "Edge" (or sometimes "customer"),
and their security policies are generally, by long standing tradition,
the rest of the paper is also germane to this thread. just fya, we keep
rehashing the UNimportant part of this argument, and never progressing.
(from this, i deduce that we must be humans.)