On Thu, 23 Sep 2010, Philip Homburg wrote:
I did not mean to trust the CPE. I mean that whatever layer violation you want done, can be hidden in the CPE instead of exposing it to the host (or router) behind it.
I don't see how this would work/help. I cannot trust the CPE, so I still need to do all the same filtering as I would have to without the CPE.
-- Mikael Abrahamsson email: [email protected] -------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
