BGP DDoS Mitigation. Gunter Van de Velde. Sr Technical Leader NOSTG, Cisco Systems. May 2013. 2012 Cisco and/or its affiliates. All rights reserved.

Similar documents
IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

Scalable DDoS mitigation using BGP Flowspec

Table of Contents. Cisco Configuring a Basic MPLS VPN

Configuring a Basic MPLS VPN

ASA 9.x EIGRP Configuration Example

Lab 4.2 Challenge Lab: Implementing MPLS VPNs

Understanding Route Redistribution & Filtering

Introducing Basic MPLS Concepts

Frame Mode MPLS Implementation

Hunting down a DDOS attack

IOS NAT Load Balancing for Two ISP Connections

How To Make A Network Secure

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

Understanding Virtual Router and Virtual Systems

Table of Contents. Cisco How Does Load Balancing Work?

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Multiprotocol Label Switching Load Balancing

- Multiprotocol Label Switching -

APNIC elearning: BGP Attributes

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

BGP Best Path Selection Algorithm

Cisco Configuring Basic MPLS Using OSPF

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Chapter 2 Lab 2-2, EIGRP Load Balancing

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Advanced Routing. FortiOS Handbook v3 for FortiOS 4.0 MR3

How To Understand Bg

Why Is MPLS VPN Security Important?

Border Gateway Protocol (BGP)

MPLS-based Layer 3 VPNs

IPv6 Hands-on Lab. Faraz Shamim, Technical Leader Harold Ritter, Technical Leader. Toronto, Canada May 30, 2013

Introduction Inter-AS L3VPN

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Configuring a Load-Balancing Scheme

MPLS Implementation MPLS VPN

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Internet inter-as routing: BGP

EE627 Lecture 22. Multihoming Route Control Devices

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Border Gateway Protocol BGP4 (2)

Approaches for DDoS an ISP Perspective.

MPLS VPN Route Target Rewrite

Unicast Reverse Path Forwarding

IP Routing Configuring Static Routes

FortiOS Handbook - Advanced Routing VERSION 5.2.2

Implementing MPLS VPNs over IP Tunnels

Internetworking II: MPLS, Security, and Traffic Engineering

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

APNIC elearning: BGP Basics. Contact: erou03_v1.0

Configuring a Gateway of Last Resort Using IP Commands

How Routers Forward Packets

BGP Terminology, Concepts, and Operation. Chapter , Cisco Systems, Inc. All rights reserved. Cisco Public

Using OSPF in an MPLS VPN Environment

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Internetworking II: VPNs, MPLS, and Traffic Engineering

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Advanced BGP Policy. Advanced Topics

GregSowell.com. Mikrotik Routing

Introduction to Dynamic Routing Protocols

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Building A Cheaper Peering Router. (Actually it s more about buying a cheaper router and applying some routing tricks)

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Enterprise Network Simulation Using MPLS- BGP

Cisco Network Foundation Protection Overview

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

Dove siamo? Architecture of Dynamic Routing

How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2

BGP: Frequently Asked Questions

BGP Attributes and Path Selection

Routing Operations in Cisco IOS Routers

Course Contents CCNP (CISco certified network professional)

BGP1 Multihoming and Traffic Engineering

Using the Border Gateway Protocol for Interdomain Routing

SEC , Cisco Systems, Inc. All rights reserved.

HP Networking BGP and MPLS technology training

Kingston University London

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Gateway of last resort is to network

Lab Load Balancing Across Multiple Paths Instructor Version 2500

Routing Protocol - BGP

UNICAST REVERSE PATH FORWARDING ENHANCEMENTS FOR THE INTERNET SERVICE PROVIDER INTERNET SERVICE PROVIDER NETWORK EDGE

Networking. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Configuring Route Maps and Policy-Based Routing

Edge-1#show ip route Routing entry for /24. Known via "bgp 65001", distance 200, metric 0. Tag 65300, type internal

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Introduction to MPLS-based VPNs

ASA/PIX: Load balancing between two ISP - options

Transcription:

BGP DDoS Mitigation Gunter Van de Velde Sr Technical Leader NOSTG, Cisco Systems May 2013 2012 Cisco and/or its affiliates. All rights reserved. 1

A simple DDoS mitigation mechanism explained Bertrand Duvivier, bduvivie@cisco.com Gunter Van de Velde, gvandeve@cisco.com

DDoS Mitigation Adoption Cycle q Phase III o Dynamic application aware redirection and traffic handling q Phase II o Malicious traffic mitigation o Cleaning of Malicious traffic o Dirty and clean traffic handling o Usage of Multi-instance BGP q Phase I o ACL o RTBH o PBR o urpf

DDoS Overview Distributed denial-of-service (DDoS) attacks target network infrastructures or computer services by sending overwhelming number of service requests to the server from many sources. Server resources are used up in serving the fake requests resulting in denial or degradation of legitimate service requests to be served Addressing DDoS attacks Detection Detect incoming fake requests Mitigation Diversion Send traffic to a specialized device that removes the fake packets from the traffic stream while retaining the legitimate packets Return Send back the clean traffic to the server

DDOS impact on Customer Business

DDOS impact on customer Business Enterprise customer can t defend themselve, when DDoS hit the FW it s already too late. SP could protect enterprise by cleaning DDoS traffic at ingress peering point. New revenue for SP. Mandated service to propose to Financial and visible customers.

2011 DDoS trends (Nanog source) Any Internet Operator Can Be a Target for DDoS Ideologically-motivated Hacktivism and On-line vandalism DDoS attacks are the most commonly identified attack motivations Size and Scope of Attacks Continue to Grow at an Alarming Pace High-bandwidth DDoS attacks are the new normal as over 40% of respondents report attacks greater than 1 Gbps and 13% report attacks greater than 10Gbps Increased sophistication and complexity of layer-7 DDoS attacks, multi-vector DDoS attacks becoming more common First-Ever Reports of IPv6 DDoS Attacks 'in the Wild' on Production Networks

DDoS mitigation architecture 1. Detection (no DDoS) Scan Ne)low data to detect DDOS a2acks Security Server DDOS Analyser Sample Ne)low DDOS scrubber

DDoS mitigation architecture 2. Detection (DDOS) Scan Ne)low data Find DDOS signature Security Server DDOS Analyser Sample Ne)low DDOS scrubber

DDoS mitigation architecture 3. Redirect traffic to DDOS scruber Scan Ne)low data Find DDoS signature Security Server DDoS Analyser BGP DDoS Mi<ga<on Ac;on: redirect to DDoS scrubber DDoS scrubber

DDoS Mitigation: Architecture Considerations Normal traffic flow when there is no attack Redirect traffic from any edge PE to any specific DDoS scrubber Including the PE that is connected to the host network Granular (prefix level/network) diversion Customers buy DDoS mitigation service for some prefixes Pre-provisioned DDoS service for those prefixes (using policy such as standard community flag) Centralized controller that injects the diversion route VPN based Labeled return path for the clean traffic To prevent routing loops Solution support redirection of BGP less/more specific prefixes or local originated prefixes (static route, redistributed route) Support for multi-homed customers During attack, send clean traffic from DDOS scrubber to multiple PE s

The concept Traffic under normal conditions Traffic under normalized condi<ons Traffic takes shortest path Upstream and downstream traffic follow tradi;onal rou;ng ALL interfaces are in the GLOBAL rou;ng table Server Scrubber PE2 ISP PE1 PE3 Security analyser Security server Pre- provisioned DDoS instrumenta<on Traffic Scrubber Separate clean and malicious traffic Security Analyser Analyses Ne)low/IPFIX sta;s;cs from the traffic flows Security server Ac;ons upon traffic analysis by communica;on to infrastructure routers Internet users 12

Phase-1: Traditional DDoS mitigation Traffic under DDoS condition - RTBH Server PE2 Security analyser Security server ISP PE1 PE3 Scrubber Traffic under DDoS condi<on Security analyser detected that the traffic flow is dirty Security server installs a filter upon ISP ingress router All (good and malicious) traffic is dropped at network ingress Opera;onally simple method Easy to remove filter if traffic normalizes Simple to debug and troubleshoot Internet users 13

Phase-2: BGP based DDoS Traffic under DDoS condition Server Scrubber Traffic under DDoS condi<on Traffic is redirected to a scrubber Scrubber separates the clean from the malicious traffic Clean traffic is returned to original des;na;on server PE2 Security analyser Security server ISP PE1 PE3 Goal Do not drop all traffic Collect traffic intelligence Opera;onal simplicity Easy to remove redirect when traffic normalizes Internet users 14

How does it work? Normal traffic condition Server Internet and VPN Route- Reflector 2.2.2.2 PE2 5.5.5.5 3.3.3.3 Scrubber All PE s peer with the RR All PE s exchange both Global Internet and VPN prefixes All PE interfaces are non- VPN Security analyser is performing doing analyses 1.1.1.1/32 PE3 Security analyser ISP 4.4.4.4 PE1 Security server Destination Next-hop 1.1.1.1/32 2.2.2.2 Internet users 15

How does it work? Server is under DDoS Server Internet and VPN Route- Reflector 2.2.2.2 5.5.5.5 Scrubber Flow is detected as dirty by Security analyser Result: Server is under arack Traffic needs to be redirected to the scrubber to mi;gate the a2ack PE2 3.3.3.3 1.1.1.1/32 PE3 ISP 4.4.4.4 PE1 Security analyser Security server Destination Next-hop 1.1.1.1/32 2.2.2.2 Internet users 16

How does it work? Server is under DDoS Internet and VPN Route- Reflector DDoS Route- Reflector Destination Next-hop 5.5.5.5 5.5.5.5 1.1.1.1/32 3.3.3.3 Server 2.2.2.2 Scrubber PE2 3.3.3.3 1.1.1.1/32 PE3 ISP 4.4.4.4 PE1 Security server DDoS Route- Reflector was pre- visioned Mi;ga;on route to 1.1.1.1/32 is injected on the DDoS RR by the Security server Mi;ga;on route to 1.1.1.1/32 is poin;ng to 3.3.3.3 on DDoS mi;ga;on RR Internet users 17

How does it work? Server is under DDoS Destination Next-hop 1.1.1.1/32 3.3.3.3 Server 1.1.1.1/32 Internet and VPN Route- Reflector 2.2.2.2 PE2 5.5.5.5 DDoS Route- Reflector 5.5.5.5 3.3.3.3 PE3 Scrubber Mi;ga;on route to 1.1.1.1/32 is poin;ng to 3.3.3.3 is signalled to all PE s All PE s receive the mi;ga;on route from the DDoS Mi;ga;on RR Each PE will now have 2 routes to reach 1.1.1.1/32 Which route will the PE use? ISP Security server 4.4.4.4 PE1 BGP Table Rou;ng Table Destinatio n Next-hop Destination Next-hop Internet users 1.1.1.1/32 2.2.2.2 1.1.1.1/32 3.3.3.3 1.1.1.1/32???????????? 18

How does it work? Server is under DDoS Server Internet and VPN Route- Reflector 2.2.2.2 5.5.5.5 DDoS Route- Reflector 5.5.5.5 Scrubber Trick # 1 The DDoS mi<ga<on route will ALWAYS be preferred, even if Both prefix lengths are the same DDoS prefix is shorter Original prefix has be2er administra;ve distance PE2 3.3.3.3 1.1.1.1/32 PE3 ISP Security server 4.4.4.4 PE1 BGP Table Rou;ng Table Destinatio n Next-hop Destination Next-hop 1.1.1.1/32 2.2.2.2 1.1.1.1/32 3.3.3.3 Internet users 1.1.1.1/32 3.3.3.3 19

How does it work? Server is under DDoS Server Internet and VPN Route- Reflector 2.2.2.2 PE2 5.5.5.5 DDoS Route- Reflector 5.5.5.5 3.3.3.3 Clean traffic Scrubber The mi;gated traffic flows towards PE3 (3.3.3.3) PE3 is sending the dirty flow towards the scrubber The scrubber will Handle and remove the dirty traffic within the original flow Send the cleaned traffic towards the original des;na;on (1.1.1.1 at PE2 (2.2.2.2)) 1.1.1.1/32 PE3 ISP 4.4.4.4 PE1 BGP Table Rou;ng Table Destinatio n Next-hop Destination Next-hop Internet users 1.1.1.1/32 2.2.2.2 1.1.1.1/32 3.3.3.3 1.1.1.1/32 3.3.3.3 20

How does it work? Server is under DDoS Server 1.1.1.1/32 Internet and VPN Route- Reflector 2.2.2.2 PE2 5.5.5.5 DDoS Route- Reflector 5.5.5.5 3.3.3.3 PE3 Clean traffic Scrubber Problem Scrubber sends traffic to PE3 PE3 does rou;ng lookup for 1.1.1.1 and finds that it is directly a2ached ROUTING LOOP!!! How do we fix this? Ocen this is fixed with true rou;ng clutches: Back- to- back cables L2- VPN s Manual tunnels Etc (all opera;onal hard to maintain) Be2er to use a new isolated dynamic rou;ng table for the clean traffic Pre- provision this Clean table ISP 4.4.4.4 PE1 BGP Table Rou;ng Table Destinatio n Next-hop Destination Next-hop Internet users 1.1.1.1/32 2.2.2.2 1.1.1.1/32 3.3.3.3 1.1.1.1/32 3.3.3.3 21

How does it work? Server is under DDoS Server 2.2.2.2 PE2 3.3.3.3 Scrubber The clean traffic will be injected upon PE3 on an interface member of VPN Clean PE3 will now do a rou;ng des;na;on lookup for 1.1.1.1 in VPN Clean The matching rou;ng table entry is poin;ng towards PE2 at 2.2.2.2 The clean flow, which is now part of VPN Clean is sent towards PE2 reachable at 2.2.2.2 1.1.1.1/32 PE3 ISP 4.4.4.4 PE1 BGP Table Rou;ng Table Internet users VPN Clean Destinatio n Next-hop 1.1.1.1/32 2.2.2.2 1.1.1.1/32 3.3.3.3 Destinatio n Next-hop VPN 1.1.1.1/32 3.3.3.3 Global 1.1.1.1/32 2.2.2.2 Clean 22

How does it work? Server is under DDoS Server 2.2.2.2 Rou;ng Table Destinatio n Next-hop VPN 1.1.1.1/32 3.3.3.3 Global 1.1.1.1/32 CE1 Clean Scrubber PE2 receives the clean flow within VPN clean PE2 does a des;na;on address rou;ng lookup in VPN clean A matching route is found in VPN clean Flow is forwarded towards CE1 onwards to Server 1.1.1.1/32 CE1 PE2 3.3.3.3 PE3 ISP 4.4.4.4 PE1 HOLD on a minute! PE2 does not have any interface part of VPN clean All interfaces on PE2 are global interfaces so how did that clean route for 1.1.1.1 get into VPN clean? Internet users 23

How does it work? Server is under DDoS BGP Table Rou;ng Table Destinati on Nexthop VPN Destinatio n Next-hop VPN 1.1.1.1/32 CE1 Global 1.1.1.1/32 3.3.3.3 Global 1.1.1.1/32 3.3.3. 3 Server 1.1.1.1/32 Global 1.1.1.1 CE1 clean CE1 2.2.2.2 PE2 ISP 4.4.4.4 PE1 1.1.1.1/32 CE1 Clean 3.3.3.3 PE3 Scrubber Trick # 2 Copy the locally BGP inserted route directly into VPN clean BGP table Neighbour details are inherited from the global table (i.e.) Outgoing interface Next- hop Interface poin>ng towards CE1 is NOT VPN aware This VPN clean distributed as normal VPN New CLI command to do that import from default- vrf route- policy ddos adver<se- as- vpn Internet users 24

Going back to traditional traffic flow DDoS attack has ended Destination Next-hop Internet and VPN Route- Reflector DDoS Route- Reflector 1.1.1.1/32 3.3.3.3 5.5.5.5 5.5.5.5 Server 1.1.1.1/32 2.2.2.2 3.3.3.3 Scrubber Remove the rou;ng entry on the Mi;ga;on DDoS RR No more route is remaining on the DDoS Mi;ga;on RR Traffic flows normally again ISP 4.4.4.4 PE1 Security server Internet users 25

Why injecting DDoS in separate BGP instance? Solution support redirection of BGP less/more specific prefixes or local originated prefixes (static route, redistributed route) Indepenant Inter-Domain control plane and DDoS plane No need to withdraw and re-signal Inter-Domain prefixes, keep internet route intacts in control plane. Easy to troubleshoot

Any Ques<ons?

BRKRST-3371 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public

Backup Slides Technical details

Configuration (1) router bgp 99 instance ddos bgp router- id 3.3.3.3 bgp read- only bgp install diversion address- family ipv4 unicast! Crea;on of DDoS BGP instance Allows config of 2th IPv4 or IPv6 instance Suppresses BGP Update Genera;on router bgp 99 bgp router- id 2.2.2.2 address- family ipv4 unicast! Triggers BGP ddos instance to install diversion path to RIB, so that the paths are pushed down to FIB

Configuration (2) Impor;ng the global route s in the clean VRF vrf clean address- family ipv4 unicast import from default- vrf route- policy ddos adver<se- as- vpn export route- target 111:1!! address- family ipv6 unicast import from default- vrf route- policy ddos adver<se- as- vpn export route- target 111:1!!!

show commands RP/0/0/CPU0:hydra-prp-A#show route Codes: C - connected, S - static, R - RIP, B - BGP, (>) - Diversion path D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - ISIS, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, su - IS-IS summary null, * - candidate default U - per-user static route, o - ODR, L - local, G - DAGR A - access/subscriber, a - Application route, (!) - FRR Backup path Gateway of last resort is not set O O L O O 1.0.11.0/24 [110/2] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 1.1.1.1/32 [110/2] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 2.2.2.2/32 is directly connected, 00:37:24, Loopback0 3.3.3.3/32 [110/2] via 87.0.1.2, 00:36:19, GigabitEthernet0/2/1/9 4.4.4.4/32 [110/3] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 [110/3] via 87.0.1.2, 00:36:19, GigabitEthernet0/2/1/9 B 5.5.5.5/32 [200/0] via 1.1.1.1, 00:34:22 B > [200/0] via 123.0.0.2, 00:34:22 [...]

show commands (1) RP/0/0/CPU0:hydra-prp-A#show route Codes: C - connected, S - static, R - RIP, B - BGP, (>) - Diversion path D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - ISIS, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, su - IS-IS summary null, * - candidate default U - per-user static route, o - ODR, L - local, G - DAGR A - access/subscriber, a - Application route, (!) - FRR Backup path Gateway of last resort is not set O O L O O 1.0.11.0/24 [110/2] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 1.1.1.1/32 [110/2] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 2.2.2.2/32 is directly connected, 00:37:24, Loopback0 3.3.3.3/32 [110/2] via 87.0.1.2, 00:36:19, GigabitEthernet0/2/1/9 4.4.4.4/32 [110/3] via 13.0.3.1, 00:36:19, GigabitEthernet0/2/1/5 [110/3] via 87.0.1.2, 00:36:19, GigabitEthernet0/2/1/9 B 5.5.5.5/32 [200/0] via 1.1.1.1, 00:34:22 B > [200/0] via 123.0.0.2, 00:34:22 [...]

show commands (2) RP/0/0/CPU0:hydra-prp-A#show route 5.5.5.5/32 Routing entry for 5.5.5.5/32 Known via "bgp 2394-ro", distance 200, metric 0, type internal Installed Feb 19 22:56:45.896 for 00:34:33 Routing Descriptor Blocks 1.1.1.1, from 1.1.1.1 Route metric is 0 123.0.0.2, from 101.0.0.4, Diversion Path (bgp) Route metric is 0 No advertising protos. RP/0/0/CPU0:hydra-prp-A#show cef 5.5.5.5/32 det 5.5.5.5/32, version 60652, internal 0x14000001 (ptr 0xaf6e3840) [1], 0x0 (0x0), 0x0 (0x0) Updated Feb 19 22:56:46.723 local adjacency 87.0.1.2 Prefix Len 32, traffic index 0, precedence n/a, priority 4 gateway array (0xae07a310) reference count 2, flags 0x8020, source rib (5), 0 backups [1 type 3 flags 0xd0141 (0xae10f8c0) ext 0x420 (0xaec261e0)] LW-LDI[type=0, refc=0, ptr=0x0, sh-ldi=0x0] via 123.0.0.2, 2 dependencies, recursive [flags 0x6000] path-idx 0 [0xaf6e3c00 0x0] next hop 123.0.0.2 via 123.0.0.0/24 Load distribution: 0 (refcount 1) Hash OK Interface Address 0 Y GigabitEthernet0/2/1/9 87.0.1.2

show commands (3) RP/0/0/CPU0:hydra-prp-A# show route 123.0.0.2 Routing entry for 123.0.0.0/24 Known via "ospf 100", distance 110, metric 2, type intra area Installed Feb 19 22:54:48.363 for 00:39:01 Routing Descriptor Blocks 87.0.1.2, from 3.3.3.3, via GigabitEthernet0/2/1/9 Route metric is 2 No advertising protos. RP/0/0/CPU0:hydra-prp-A# RP/0/0/CPU0:hydra-prp-A#show route 1.1.1.1 Routing entry for 1.1.1.1/32 Known via "ospf 100", distance 110, metric 2, type intra area Installed Feb 19 22:54:49.259 for 00:49:20 Routing Descriptor Blocks 13.0.3.1, from 1.1.1.1, via GigabitEthernet0/2/1/5 Route metric is 2 No advertising protos.

2012 Cisco and/or its affiliates. All rights reserved. 36