Malisa mentioned recommendations about maintaining untrusted nbr cache
entries. There is another work-in-prg on lwig which takes into
considerations these aspects of maintaining nbr entries for network
access/auth protocol.

https://datatracker.ietf.org/doc/draft-ietf-lwig-nbr-mgmt-policy/
Pls check if your considerations are handled. Thanks.

Regards,
Rahul
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to