Malisa mentioned recommendations about maintaining untrusted nbr cache entries. There is another work-in-prg on lwig which takes into considerations these aspects of maintaining nbr entries for network access/auth protocol.
https://datatracker.ietf.org/doc/draft-ietf-lwig-nbr-mgmt-policy/ Pls check if your considerations are handled. Thanks. Regards, Rahul
_______________________________________________ 6tisch mailing list [email protected] https://www.ietf.org/mailman/listinfo/6tisch
