On Thu, 23 Sep 2010, Philip Homburg wrote:

I did not mean to trust the CPE. I mean that whatever layer violation you want done, can be hidden in the CPE instead of exposing it to the host (or router) behind it.

I don't see how this would work/help. I cannot trust the CPE, so I still need to do all the same filtering as I would have to without the CPE.

--
Mikael Abrahamsson    email: [email protected]
--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to