How More Specifics increase your transit bill (and ways to avoid it)



Similar documents
How to maximize the available capacity!

How to Become a Smart IP Transit Buyer

Simple Multihoming. ISP/IXP Workshops

Advanced BGP Policy. Advanced Topics

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

APNIC elearning: BGP Basics. Contact: erou03_v1.0

BGP Attributes and Path Selection

Exterior Gateway Protocols (BGP)

Module 12 Multihoming to the Same ISP

APNIC elearning: BGP Attributes

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

How To Understand Bg

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Understanding Route Aggregation in BGP

BGP1 Multihoming and Traffic Engineering

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Multihomed BGP Configurations

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

Using the Border Gateway Protocol for Interdomain Routing

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

Load balancing and traffic control in BGP

BGP Multihoming. Why Multihome? Why Multihome? Why Multihome? Why Multihome? Why Multihome? Redundancy. Reliability

BGP and Traffic Engineering with Akamai. Christian Kaufmann Akamai Technologies MENOG 14

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Load balancing and traffic control in BGP

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

E : Internet Routing

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

Chapter 49 Border Gateway Protocol version 4 (BGP-4)

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2

pmacct: introducing BGP natively into a NetFlow/sFlow collector

Internet inter-as routing: BGP

Border Gateway Protocol (BGP)

BGP Multihoming Techniques. Philip Smith APRICOT 2013 Singapore 19 th February 1 st March 2013

Application Note. Failover through BGP route health injection

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

Fireware How To Dynamic Routing

Border Gateway Protocol Best Practices

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

netkit lab bgp: multi-homed Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

HP Networking BGP and MPLS technology training

BGP Multihoming Techniques

Internet Routing Protocols Lecture 04 BGP Continued

Internet inter-as routing: BGP

Interdomain Routing. Outline

MPLS VPN Route Target Rewrite

BGP Multihoming Techniques

BGP4 Case Studies/Tutorial

BSCI Module 6 BGP. Configuring Basic BGP. BSCI Module 6

no aggregate-address address mask [as-set] [summary-only] [suppress-map map-name] [advertise-map map-name] [attribute-map map-name]

BGP Terminology, Concepts, and Operation. Chapter , Cisco Systems, Inc. All rights reserved. Cisco Public

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

BGP Multihoming Techniques

BGP Multihoming Techniques

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

ETHEL THE AARDVARK GOES BGP ROUTING

A Systematic Approach to BGP Configuration Checking

BGP: Frequently Asked Questions

BGP Multihoming: An Enterprise View BRKRST , Cisco Systems, Inc. All rights reserved. Presentation_ID.scr

Lecture 18: Border Gateway Protocol"

BGP Best Path Selection Algorithm

Chapter 6: Implementing a Border Gateway Protocol Solution for ISP Connectivity

Community tools to fight against DDoS

Introduction to Routing

Understanding Virtual Router and Virtual Systems

Demystifying BGP: By Jeffrey Papen Thursday, May 15th, 2003

BGP Router Startup Message Flow

Edge-1#show ip route Routing entry for /24. Known via "bgp 65001", distance 200, metric 0. Tag 65300, type internal

Routing Protocol - BGP

- Border Gateway Protocol -

Quick Note 20. Configuring a GRE tunnel over an IPSec tunnel and using BGP to propagate routing information. (GRE over IPSec with BGP)

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January Using BGP topology information for DNS RR sorting

Gateway of last resort is to network

Border Gateway Protocol BGP4 (2)

BGP Support for Next-Hop Address Tracking

Inter-domain Routing. Outline. Border Gateway Protocol

MPLS VPN Implementation

BGP overview BGP operations BGP messages BGP decision algorithm BGP states

Introduction to BGP. Cisco ISP Workshops. 2003, Cisco Systems, Inc. All rights reserved.

Intelligent Routing Platform White Paper

Table of Contents. Cisco How Does Load Balancing Work?

JUNOS Secure BGP Template

Understanding Large Internet Service Provider Backbone Networks

Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

BGP Link Bandwidth. Finding Feature Information. Contents

Border Gateway Protocol (BGP-4)

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

Troubleshooting Network Performance with Alpine

BGP Advanced Routing in SonicOS

BGP (Border Gateway Protocol)

BGP Techniques for Internet Service Providers

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

Configuring BGP. The Cisco BGP Implementation

Transcription:

How More Specifics increase your transit bill (and ways to avoid it)

Your Speaker Today... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter: @init7 Init Seven AG Elias-Canetti-Strasse 7 CH-8050 Zürich 2 I February 2012

AGENDA A Init7 / AS13030 B Eyeball Traffic Engineering C Content Networks: Damage D Content Networks: Solutions 3 I February 2012

A Init7 / AS13030 4 I February 2012

Init7 / AS13030 [ marketing slide - intentionally left blank ] 5 I February 2012

DISCLAIMER These slides show experience examples of the Init7 / AS13030 backbone over various years. They may work or may not work for you. Please use the methods described with care and at your own risk. Init7 or the author cannot be held responsible for any damage occurred by using the methods described here. 6 I February 2012

B Eyeball Traffic Engineering 7 I February 2012

We love Peering, don t we? Many networks try to peer as much as possible and shift traffic away from transit Tier-2 networks connected to multiple exchanges usually can do more than 50 (60, 70%?) of their traffic via peering and see 40, 50% of the global routing table via peering BGP sessions 8 I February 2012

Content vs. Eyeballs Content (outbound heavy) networks commonly try to dump the traffic as close to the source as possible and use the cheapest route Eyeball (inbound heavy) networks tend to fight against (sometimes very) expensive saturated links and use measures to load-balance the traffic as well as possible These interests are often contradicting! 9 I February 2012

Eyeball Traffic Engineering #1 If you can't upgrade and money is not sufficient for more capacity, then some links tend to be more saturated than others Refer to my slides How to maximize the available capacity! for traffic engineering measures (hint: selecting your transit provider wisely...) http://www.blogg.ch/uploads/bgp-traffic-engineering-considerations.pdf 10 I February 2012

Eyeball Traffic Engineering #2 What Eyeball Networks usually do: Prepending (works sometimes) Selective announcements to various suppliers (drawback: less redundancy) Community based traffic engineering (instruct the transit to prepend / do not announce certain prefixes) Refer to http://onesc.net/communities/ 11 I February 2012

Eyeball Traffic Engineering #3 What Eyeball Networks usually do : More-Specific propagation Acceptable, when smartly & decently executed Massive de-aggregation Pollution of the Global BGP table! more than 40% of the table size is rubbish... 12 I February 2012

Eyeball Traffic Engineering #4 We all know the CIDR report, which shows how much smaller the Global BGP table could be if everybody would aggregate neatly: Aggregation Summary The algorithm used in this report proposes aggregation only when there is a precise match using AS path so as to preserve traffic transit policies. Aggregation is also proposed across non-advertised address space ('holes'). --- 04Feb12 --- ASnum NetsNow NetsAggr NetGain % Gain Description Table 398067 230015 168052 42.2% All ASes Source: http://www.cidr-report.org/as2.0/#gains 13 I February 2012

Eyeball Traffic Engineering #5 Aggregation of prefixes would be good for the whole community / industry: Less memory usage Faster BGP conversion / less CPU cycles Longer life of equipment Why are networks so selfish and don't aggregate neatly? Even though they are listed in the top #30 of the polluters for years they don't care... 14 I February 2012

Eyeball Traffic Engineering #6 Reasons other than traffic engineering for de-aggregation seen in the Global BGP table: No-export' community not set neighbor x.x.x.x send-community' not set lack of knowledge Best [worst] practice consulting out in the wild who actively promotes it?! 15 I February 2012

Eyeball Traffic Engineering #7... evangelize aggregation! If everybody would convince customers / fellow network engineers / peers to get rid of the de-aggregated prefixes, the whole community would gain! 16 I February 2012

C Content Networks: Damage 17 I February 2012

Content Networks: Damage #1 Face facts: De-aggregation is a reality and won't vanish anytime soon, actually it gets worse every day Due to De-Aggregation we will continue to learn More Specifics from transit, which would actually have been covered by Less-Specifics from Peerings 18 I February 2012

Content Networks: Damage #2 This makes all our traffic engineering efforts pretty useless because a More-Specific prefix always wins, regardless of local-pref, MED et. al. Result: Peering Traffic is shifted towards expensive transit! 19 I February 2012

Content Networks: Damage #3 How can we avoid the damage, if your network is outbound heavy? Lets do some analysis of the routing table. What do we actually see? 20 I February 2012

Content Networks: Damage #4 Bad example #1 (anonymized) Network Next Hop Metric LocPrf Weight Path *>i10.64.0.0/15 10.0.0.1 1 140 0 2222 i *>i10.64.0.0/18 10.0.0.2 1 50 0 4444 2222 i *>i10.64.0.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.32.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.64.0/18 10.0.0.2 1 50 0 4444 2222 i *>i10.64.64.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.96.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.128.0/18 10.0.0.2 1 50 0 4444 2222 i *>i10.64.128.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.160.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.192.0/18 10.0.0.2 1 50 0 4444 2222 i *>i10.64.192.0/19 10.0.0.1 1 140 0 2222 i *>i10.64.224.0/19 10.0.0.1 1 140 0 2222 i *>i10.65.0.0/18 10.0.0.2 1 50 0 4444 2222 2222 2222 i *>i10.65.0.0/19 10.0.0.1 1 140 0 2222 I [etc. - more similar prefixes] 21 I February 2012

Content Networks: Damage #5 Bad example #2 (anonymized) Network Next Hop Metric LocPrf Weight Path *>i10.104.0.0/13 10.0.0.1 1 150 0 7777 9999 5555 2222? *>i10.104.0.0/15 10.0.0.1 1 150 0 7777 9999 5555 2222? *>i10.106.0.0/15 10.0.0.2 1 50 0 4444 6666 2222? *>i10.108.0.0/15 10.0.0.2 1 50 0 4444 6666 2222? *>i10.109.128.0/17 10.0.0.1 1 150 0 8888 6666 2222? *>i10.110.0.0/15 10.0.0.1 1 150 0 7777 9999 5555 2222? *>i10.110.0.0/16 10.0.0.1 1 150 0 8888 6666 2222? 22 I February 2012

D Content Networks: Solutions 23 I February 2012

Content Networks: Solutions#1 The Challenge As there are too many More-Specific prefixes advertised by transit, manual filtering is not an option Once a prefix filter is applied on the transit link, the More- Specific prefix has vanished and is no longer visible in our BGP table. This makes automated checking for black holes difficult 24 I February 2012

Content Networks: Solutions#2 The Challenge We don't know how routers behave when applying a prefix list with several thousand entries. It actually worked with Brocade XMR gear, but results in a very time consuming BGP conversion (> 10 minutes...) The risk of black-holing is severe. Some networks with a lot of de-aggregation may remove covering less specifics without being noticed... 25 I February 2012

Content Networks: Solution #3 Init7 did some research and scripted an automated filtering system, based on the Piranha BGP daemon / route collector: http://www.spale.com/download/piranha/ Status of the filter script at this moment is very alpha and not yet to be published, but Init7 plans to publish its findings under a 'GPL alike' license once the results are more mature 26 I February 2012

Content Networks: Solution #4 As mentioned, for the processing of the prefix-list, an unfiltered dump of the transit BGP feed is required We achieve this with a shell login and parsing the output of the router command sh ip bgp neighbor x.x.x.x received-routes and dump it into the Piranha BGP daemon. This is not the foreseen way of feeding Piranha, but it eliminates the need of the transit supplier to configure a 2 nd transit session (with ebgp multihop to our route collector) 27 I February 2012

Content Networks: Solution #5 After applying a prefix list of several hundred lines step-by-step, more than 20k More-Specific prefixes got filtered... and transit traffic got reduced a lot several Gigs! This graph shows traffic reduction towards [mayor TIER-1] (based on sflow data), which got shifted to peering 28 I February 2012

Content Networks: Solution #6 We started to refine the script, and the prefix-list became more sophisticated, however it really became huge! Result: Router (in our case Brocade XMR) could no longer save the running configuration ('wr mem' command) On top: when applying a new prefix-list, BGP convergence took hours, not minutes Consequence: filtering more-specifics by prefix-list works only for a few hundred or a few thousand prefixes, not on a large scale 29 I February 2012

Content Networks: Solution #7 So let's think: how can we handle this problem without overloading router configuration and CPU cycles? We need a new BGP feature: router bgp neighbor x.x.x.x remote-as yyyyy neighbor x.x.x.x suppress-more-specifics 30 I February 2012

Content Networks: Solution #8 New feature behaviour: neighbor x.x.x.x suppress-more-specifics to be enabled/disabled per neighbor not enabled by default dumps any received route from RIB/FIB if covered by a less-specific route learned by the same or another neighbor active monitoring if a covering prefix vanishes, the previously dumped prefix should become active 31 I February 2012

Content Networks: Solution #9 Other possible solutions #1: Quagga OpenBGPd box which injects a BGP feed with rewritten nexthops advantage: if this box crashes, no outage as BGP just works the normal way disadvantage: not tested, quite some programming work expected 32 I February 2012

Content Networks: Solution #10 Other possible solutions #2: large scale prefix filtering along the RIR boundaries - see http://www.swinog.ch/meetings/swinog7/bgp_filtering-swinog.ppt advantage: BGP table reduces significantly less memory disadvantage: requires default route (many black-holes without!) RIR boundaries are meanwhile too often /24 33 I February 2012

If you have any questions, please contact me... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter: @init7 Init Seven AG Elias-Canetti-Strasse 7 CH-8050 Zürich 34 I February 2012