DDoS Damage Control Cheap & effec3ve
|
|
|
- Valentine Fowler
- 10 years ago
- Views:
Transcription
1 DDoS Damage Control Cheap & effec3ve Job Snijders RIPE68
2 Who am I? Job Snijders Independent Network Architect Founder of NLNOG RING Hobbies: IP Rou3ng, LISP, MPLS, IPv6, RPSL Shoe size: 45/EU 2
3 Agenda What is selec&ve blackholing? Defini3on Examples based on RIPE ATLAS How to set up selec3ve blackholing as a carrier Defining scopes Route- maps Some python 3
4 What is selec3ve blackholing? Selec%ve blackholing ~ selec%ve discarding 1. Use BGP communi3es to instruct your Service Provider to discard packets when certain condi0ons are met. 2. A region of space- 3me from which gravity prevents anything, including light, from escaping, except the colour purple. 4
5 What does it maper? Content is most ocen the vic3m (webshop, gameserver, webserver) Most prefixes/content have a geographical significance which decreases as distance between the sender and receiver increases. (theorem stems from sflow data gathered at global ISP). In other words: Chances are a Polish web- shop owner cares most about Polish eyeballs. 5
6 What s wrong with normal blackholing? Classic blackholing is an all or nothing proposi0on: you throw away all revenue generated by the vic3m IP address, in order to avoid conges3ng your upstream links. 6
7 Scope is relevant 7
8 Damage control is not mi3ga3on Selec3ve blackholing should be considered as yet another tool in the toolbox when under duress. Asser3on #1: it is be6er to remain par&ally reachable than not reachable at all during a DDoS a6ack Asser3on #2: I can take a percentage of the DDoS traffic, but not all 8
9 Effects: Discard outside 1000 KM radius Customer connects in Amsterdam, Netherlands White dot means traffic cannot reach des3na3on Colored dot implies reachability 9
10 Effects: Discard outside this country White dot means traffic cannot reach des3na3on Color dot implies reachability, Customer connected in Amsterdam, NL 10
11 discard outside NL is perfect reachability inside NL White dot means traffic cannot reach des3na3on Color dot implies reachability 11
12 Part 2: How to set this up as carrier Focus on four features: Scope Outside This country Outside This con3nent Outside 1000 KM radius Outside 2500 KM radius End- user BGP community 15562: : : :662 This means where the customer interconnec3on is located Distance is from Edge router to Edge router in the SP s network as the crow flies (not actual op3cal fiber path length). Can only be guaranteed for own backbone 12
13 Assign your routers some integers name Con0nent id ISO31661 City ID La0tude, Longitude tky.jp , sjo.us , dal.us , nyc.us , lon.uk , ams.nl , sto.se ,
14 Router specific configura3on IOS ish nyc.us: ip community-list THIS:METRO seq 5 permit 65123:10026 ip community-list THIS:COUNTRY seq 5 permit 65123:840 ip community-list THIS:CONTINENT seq 5 permit 65123:1000 lon.uk: ip community-list THIS:METRO seq 5 permit 65123:20023 ip community-list THIS:COUNTRY seq 5 permit 65123:276 ip community-list THIS:CONTINENT seq 5 permit 65123:2000 ams.nl: ip community-list THIS:METRO seq 5 permit 65123:20020 ip community-list THIS:COUNTRY seq 5 permit 65123:528 ip community-list THIS:CONTINENT seq 5 permit 65123:2000 etc 14
15 What happens where? 15
16 ibgp inbound route- map ip route null0 route-map INBOUND-IBGP permit 100 match community 15562:666 classic blackhole community set ip next-hop discard route-map INBOUND-IBGP permit 200 match community 15562: : : :664 continue 1100 Jump over regular 1000 towards scope checking route-map INBOUND-IBGP permit 1000 No match statement == accept anything route-map INBOUND-IBGP permit 1100 match community THIS:METRO THIS:COUNTRY THIS:CONTINENT If match is found, accept prefix and stop evaluating the route-map route-map INBOUND-IBGP permit 1101 Anything that arrives here: discard set ip next-hop
17 Customer facing route- map 01. route-map IMPORT:FROM:CUSTOMER-A permit match ip address prefix-list CUSTOMER-A-PREFIXES 03. match community 15562: set community no-export additive 05. set ip next-hop route-map IMPORT:FROM:CUSTOMER-A permit match ip address prefix-list CUSTOMER-A-PREFIXES 08. match community SCOPED:ACTION 09. continue 600 Remember this jump 10. route-map IMPORT:FROM:CUSTOMER-A permit match ip address prefix-list CUSTOMER-A-PREFIXES 12. set local-preference route-map IMPORT:FROM:CUSTOMER-A deny
18 Customer facing (cont.) Add/Rewrite scoping informa3on when a scoped ac3on is used 14. route-map IMPORT:FROM:CUSTOMER-A permit 600 Here is 600 again 15. match community OUTSIDE:1000KM:RADIUS:DISCARD 15562: set community 65123:10029 additive 17. route-map IMPORT:FROM:CUSTOMER-A permit match community OUTSIDE:2500KM:RADIUS:DISCARD 15562: set community 65123: :10029 additive 20. route-map IMPORT:FROM:CUSTOMER-A permit match community OUTSIDE:THIS:COUNTRY:DISCARD 15562: set community 65123:840 additive 23. route-map IMPORT:FROM:CUSTOMER-A permit match community OUTSIDE:THIS:CONTINENT:DISCARD 15562: set community 65123:1000 additive 18
19 What happens where? 19
20 But wait a second how do you figure out what needs to be rewripen to what? Gratis download 20
21 Proof: Socware is cool SDN finally arrived derp:~ job$ wget -q derp:~ job$ python example_community_calculator.py r1.lon.uk - rewrite targets: 1000 km: 65123: : km: 65123:2000 r1.dal.us - rewrite targets: 1000 km: 65123: km: 65123:840 r1.sjo.us - rewrite targets: 1000 km: 65123: km: 65123: :10029 r1.nyc.us - rewrite targets: 1000 km: 65123: km: 65123: :10033 <snip> 21
22 COMM /RTR The integers in essence provide groupings of routers, which the socware/route- maps use :276 :2000 :10033 :840 :10029 :10026 :30046 :20022 :20020 ams.nl X X lon.uk X X sto.se X X nyc.us X X dal.us X X sjo.us X X tky.jp X (incomplete table, but you get the gist ) 22
23 Process flow diagram Calculate all route- maps (offline) Deploy to routers (expect/netconf) Customer sa3sfac3on (awesome) 23
24 Considera3ons Automate all route- map deployments (actually, automate everything) Use or make a CMDB where you store integers Selec3ve Blackholing is a prepy advanced feature.. with very liple router specific configura3on J Can be deployed on any vendor. Crappy vendors are not an excuse. This requires no extra CAPEX Customers don t ask for this feature because they don t know it exists (yet) Saves both the service provider and customer money: win/win 24
25 Ques3ons? 25
26 Resources & Credits Technical narra3ve in text form: hpp://mailman.nanog.org/pipermail/nanog/2014- February/ html I want to thank Saku Yx, Torsten Blum and Peter van Dijk for contribu3ng to this methodology. 26
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Understanding MPLS Hashing
Understanding MPLS Hashing And how it affects your brand new equipment Jeff Wheeler [email protected] Job Snijders [email protected] NANOG57 Jeff Wheeler Who are we? Consultant design, implement,
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)
Scalable DDoS mitigation using BGP Flowspec
Scalable DDoS mitigation using BGP Flowspec Wei Yin TAY Consulting Systems Engineer Cisco Systems 2010 Cisco and/or its affiliates. All rights reserved. Goals of DDoS Mi,ga,on Problem descrip,on Tradi,onal
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
BGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved.
BGP DDoS Mitigation Gunter Van de Velde Sr Technical Leader NOSTG, Cisco Systems May 2013 2012 Cisco and/or its affiliates. All rights reserved. 1 A simple DDoS mitigation mechanism explained Bertrand
Administra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16
BGP Brad Smith Administra0via How are the labs going? This week STP quiz Thursday, 5/9 Next week STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16 Following
- Route Filtering and Route-Maps -
1 Prefix-Lists - Route Filtering and Route-Maps - Prefix-lists are used to match routes as opposed to traffic. Two things are matched: The prefix (the network itself) The prefix-length (the length of the
How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2
61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior
BGP Multihoming. Why Multihome? Why Multihome? Why Multihome? Why Multihome? Why Multihome? Redundancy. Reliability
Why Multihome? BGP Multihoming ISP/IXP Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WN media (physical failure, carrier failure)
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
Multihomed BGP Configurations
Multihomed BGP Configurations lvaro Retana Cisco IOS Deployment and Scalability 1 genda General Considerations Multihomed Networks Best Current Practices 2 The Basics General Considerations 3 General Considerations
BGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
Simple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
Methods of interconnecting MPLS Networks
Methods of interconnecting MPLS Networks NANOG31, May 2005 San Francisco Cable & Wireless Internet Engineering Udo Steinegger What this talk is about General This presentation covers technologies on how
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
Community tools to fight against DDoS
Community tools to fight against DDoS Fakrul Alam Senior Training Officer SANOG 27 & APNIC Regional Meeting, Kathmandu, Nepal 25 Jan - 01 Feb, 2016 Issue Date: Revision: 26-12-2015 1.3 DDoS Denial of Service
netkit lab bgp: prefix-filtering Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: prefix-filtering Version Author(s) E-mail Web Description 2.1 G. Di Battista,
DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
Fireware How To Dynamic Routing
Fireware How To Dynamic Routing How do I configure my Firebox to use BGP? Introduction A routing protocol is the language a router speaks with other routers to share information about the status of network
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith , Seoul, South Korea August 2003 1 Presentation Slides Available on ftp://ftp-eng.cisco.com/pfs/seminars/ 2 Preliminaries Presentation has many configuration
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
BGP4 Case Studies/Tutorial
BGP4 Case Studies/Tutorial Sam Halabi-cisco Systems The purpose of this paper is to introduce the reader to the latest in BGP4 terminology and design issues. It is targeted to the novice as well as the
Simple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
DDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
Building a small Data Centre
Building a small Data Centre Cause we re not all Facebook, Google, Amazon, Microsoft Karl Brumund, Dyn RIPE71 1 Dyn what we do DNS, email, Internet Intelligence from where 28 sites, 100s of probes, clouds
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith 26th July - 4th August 2006 Karachi 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog8-multihoming.pdf And on the SANOG8
The Naughty port Project
The Naughty port Project May 2016 RIPE72 2016 Copenhagen, DK Prepared by: Erik Bais [email protected] Confiden'al 23-5-2016 What is our business?? o Registra'on of IP addresses and AS numbers o IP
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
DEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line
Anycast Rou,ng: Local Delivery Tom Daly, CTO h
BGP Communities: A Guide for Service Provider Networks. Tom Scholl <[email protected]>
BGP Communities: A Guide for Service Provider Networks Richard A Steenbergen Tom Scholl nlayer Communications, Inc. AT&T What are BGP Communities? Defined by RFC1997
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith SANOG 12 6th-14th August 2008 Kathmandu 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/sanog12-multihoming.pdf And on the
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA
BGP Best Practices for ISPs Prefix List, AS PATH filters, Bogon Filters, Anycast, Mailing Lists, INOC DBA. Gaurab Raj Upadhaya [email protected] Packet Clearing House What are Best Practices Established or
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
BGP Multihoming Techniques. Philip Smith <[email protected]> APRICOT 2013 Singapore 19 th February 1 st March 2013
BGP Multihoming Techniques Philip Smith APRICOT 2013 Singapore 19 th February 1 st March 2013 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/ APRICOT2013-Multihoming.pdf
Internetworking II: MPLS, Security, and Traffic Engineering
Internetworking II: MPLS, Security, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London Last Fme: Internetworking IP interconnects
IPv6 and 4-byte ASN Update
IPv6 and 4-byte ASN Update Philip Smith PacNOG 8 Pohnpei, FSM 22nd-27th November 2010 1 IPv6 Update 2 2004 Today Resurgence in demand for IPv4 address space 5% address space still unallocated
How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv
BGP Support for IP Prefix Import from Global Table into a VRF Table The BGP Support for IP Prefix Import from Global Table into a VRF Table feature introduces the capability to import IPv4 unicast prefixes
Approaches for DDoS an ISP Perspective. [email protected] [email protected]
Approaches for DDoS an ISP Perspective [email protected] [email protected] Home School How everyone starts It s all up to you It s inexpensive (compared to other forms of education) Quality may not
Border Gateway Protocol Best Practices
Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith PacNOG 2 Workshop Apia, Samoa 18-24 June 2006 PacNOG 2 Workshops 1 BGP Multihoming Techniques Why Multihome? Definition & Options Preparing the Network
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Visualizing Traffic on Network Topology
Visualizing Traffic on Network Topology NTT Communications, Kazunori Kamiya NTT Laboratories, Hiroshi Kurakami Agenda Company Introduction Motivation and Goals Things to consider Method of visualizing
netkit lab bgp: multi-homed Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: multi-homed Version Author(s) E-mail Web Description 2.0 G. Di Battista, M. Patrignani,
BGP-4 Case Studies. Nenad Krajnovic. e-mail: [email protected]
BGP-4 Case Studies Nenad Krajnovic e-mail: [email protected] Today topics load balancing over multiple links multihoming to a single provider multihoming to different providers following defaults inside
BGP Support for Next-Hop Address Tracking
The feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established.
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith NANOG 41 14th - 16th October 2007 Albuquerque, New Mexico 1 Presentation Slides Available on ftp://ftp-eng.cisco.com /pfs/seminars/nanog41-multihoming.pdf
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos
Firewall-on-Demand GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF Leonidas Poulopoulos 1 leopoul@nocgrnetgr 1 NOC/Greek Research and Technology Network
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
The benefits of BGP for every service provider
The benefits of BGP for every service provider UKUUG - Spring 2011 24th of March 2011 Thomas Mangin Exa Networks Whatever a speaker is missing in depth he will compensate for in length Montesquieu NO Networking
Chapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
Building A Cheaper Peering Router. (Actually it s more about buying a cheaper router and applying some routing tricks)
Building A Cheaper Peering Router (Actually it s more about buying a cheaper router and applying some routing tricks) Tom Scholl nlayer Communications, Inc. 1 What s this all about?
How More Specifics increase your transit bill (and ways to avoid it)
How More Specifics increase your transit bill (and ways to avoid it) Your Speaker Today... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter:
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG46 June 14, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
Hunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
BGP Multihoming Techniques
BGP Multihoming Techniques Philip Smith , Oakland 2001, Cisco Systems, Inc. All rights reserved. 1 Presentation Slides Available on NANOG Web site www.nanog.org/mtg-0110/smith.html Available
pmacct: introducing BGP na2vely into a NetFlow/sFlow collector
pmacct: introducing BGP na2vely into a NetFlow/sFlow collector Paolo Lucente pmacct http://www.pmacct.net/ Netnod 2012 spring meeting, Stockholm, 17 th Feb 2012 Square 0 NetFlow
Measuring IP Network Routing Convergence. A new approach to the problem
59 Measuring IP Network Routing Convergence A new approach to the problem A Blind Spot In Network Performance Monitoring Today s monitoring technologies tell us how the network performs in steady state
WHITEPAPER. Bringing MPLS to Data Center Fabrics with Labeled BGP
WHITEPAPER Bringing MPLS to Data Center Fabrics with Labeled BGP Bringing MPLS to Data Center Fabrics with Labeled BGP MPLS is a well-known and mature technology typically used in service provider environment.
Border Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG45 January 26, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting.com Introductions Slide 1 Why
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: 642-691 Total Questions: 401
Question: 1 Every time a flap occurs on a route, the route receives A. 750 per-flap penalty points which are user configurable B. 1500 per-flap penalty points which are user configurable C. 200 per-flap
BGP Operations and Security. Training Course
BGP Operations and Security Training Course Training Services RIPE NCC April 2016 Schedule 09:00-09:30 11:00-11:15 13:00-14:00 15:30-15:45 17:30 Coffee, Tea Break Lunch Break End BGP Operations and Security
IPv6 Addressing. ISP Training Workshops
IPv6 Addressing ISP Training Workshops 1 Where to get IPv6 addresses p Your upstream ISP p Africa n AfriNIC http://www.afrinic.net p Asia and the Pacific n APNIC http://www.apnic.net p North America n
BGP Advanced Routing in SonicOS
BGP Advanced Routing in SonicOS Document Scope This document provides an overview of SonicWALL s implmenetation of Border Gateway protocol (BGP), how BGP operates, and how to configure BGP for your network.
Configuring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra)
Configuring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra) Contents Introduction Used Abbreviations Border Gateway Protocol (BGP) Overview
BGP and Traffic Engineering with Akamai. Christian Kaufmann Akamai Technologies MENOG 14
BGP and Traffic Engineering with Akamai Christian Kaufmann Akamai Technologies MENOG 14 The Akamai Intelligent Platform The world s largest on-demand, distributed computing platform delivers all forms
BGP Multihoming: An Enterprise View BRKRST-2322. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr
GP Multihoming: n Enterprise View 2008 isco Systems, Inc. ll rights reserved. isco Public 2 1 GP Multihoming Techniques Multihoming asics Single Provider Multiple Providers Using Policy Provider 1 The
Layer 2 Networking. Overview. VLANs. Tech Note
Layer 2 Networking Tech Note Overview PAN-OS is very flexible, allowing administrators to mix and match physical firewall interfaces amongst virtual wire, layer 2, layer 3, and tap mode configurations.
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
basic BGP in Huawei CLI
basic BGP in Huawei CLI BGP stands for Border Gateway Protocol. It is widely used among Internet Service Providers to make core routing decisions on the Internet. The current BGP version is BGP-4 defined
JUNOS Secure BGP Template
JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
MPLS VPN - Route Target Rewrite
MPLS VPN - Route Target Rewrite The MPLS VPN - Route Target Rewrite feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates. Typically, autonomous
Supporting Document PPP
Supporting Document PPP Content 1 Starter Kit... 3 2 Technical Specification Access... 3 2.1 Overview... 3 2.2 Upstream Policing for PPP@ISP... 3 2.3 Supported Protocols... 3 2.4 PPPoA... 3 2.5 PPPoE...
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.
Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain
