SlideShare a Scribd company logo
1 of 21
Communities and DDoS Mitigation at CATNIX
Maria Isabel Gandía Carriedo
CSUC/CATNIX
26-11-2021
History and RFCs (I)
1994 1995 1996 1998 2004
1982 1984 1989 1990 1991
GGP
(RFC 823)
EGP
(RFC 827)
EGP
(RFC 888/904)
BGPv1
(RFC 1105)
BGPv2
(RFC1163)
BGPv3
(RFC 1267)
BGPv4
(RFC1654)
BGPv4
(RFC 1771)
Communities
(RFC1997)
MP-BGP
(RFC2283)
NOPEER
Community
(RFC3765)
History and RFCs (II)
2016 2017 2017 2018 2021
2006 2006 2007 2009 2014
BGP Support
for Four-octet
AS Number
Space
(RFC 4893)
4-Octet
AS Specific
BGP Extended
Community
(RFC 5668)
Blackhole
community
(RFC 7999)
Use of BGP
large
communities
(RFC 8195)
Extended
Communities
(RFC4360)
BGP large
communities
(RFC 8092)
Graceful BGP
Session
Shutdown
(RFC 8326)
BGPv4 CIDR
(RFC4271)
IANA
Registries for
Extended
Communities
(RFC4360)
Extended
Optional
Parameters
for BGP Open
Message
(RFC 9072)
IANA BGP Well-Known Communities
https://www.iana.org/assignments/bgp-well-known-communities/bgp-well-known-communities.xhtml
Attribute Value Attribute Reference
0x00000000-0x0000FFFF Reserved [RFC1997]
0x00010000-0xFFFEFFFF Reserved for Private Use [RFC1997]
0xFFFF0000 GRACEFUL_SHUTDOWN [RFC8326]
0xFFFF0001 ACCEPT_OWN [RFC7611]
0xFFFF0002 ROUTE_FILTER_TRANSLATED_v4 [draft-l3vpn-legacy-rtc]
0xFFFF0003 ROUTE_FILTER_v4 [draft-l3vpn-legacy-rtc]
0xFFFF0004 ROUTE_FILTER_TRANSLATED_v6 [draft-l3vpn-legacy-rtc]
0xFFFF0005 ROUTE_FILTER_v6 [draft-l3vpn-legacy-rtc]
0xFFFF0006 LLGR_STALE [draft-uttaro-idr-bgp-persistence]
0xFFFF0007 NO_LLGR [draft-uttaro-idr-bgp-persistence]
0xFFFF0008 accept-own-nexthop
[draft-agrewal-idr-accept-own-
nexthop]
0xFFFF0009 Standby PE [RFC9026]
0xFFFF000A-0xFFFF0299 Unassigned
0xFFFF029A BLACKHOLE [RFC7999]
0xFFFF029B-0xFFFFFF00 Unassigned
0xFFFFFF01 NO_EXPORT [RFC1997]
0xFFFFFF02 NO_ADVERTISE [RFC1997]
0xFFFFFF03 NO_EXPORT_SUBCONFED [RFC1997]
0xFFFFFF04 NOPEER [RFC3765]
0xFFFFFF05-0xFFFFFFFF Unassigned
Communities – Well-known and Not-so-well-known
 Created to facilitate and simplify the control of routing information.
 A community “classifies” routes.
 Each AS can define to which communities a network belongs.
 A router (BGP speaker) can modify the communities according to its own
policy.
 Usign them to indicate local-preferences is quite common.
Communities for some companies at https://onestep.net/communities/
Communities at CATNIX
ACTION
BGP
Standard
Community
(RFC 1997)
BGP Extended
Community
(RFC 4360)
BGP Large Community
(RFC 8092)
No export 65535:65281 rt:65281:peer_as 65535:65281:peer_as
No advertise 65535:65282 rt:65282:peer_as 65535:65282:peer_as
No advertise to anybody 0:60082 rt:0:60082 60082:0:0
No advertise to a peer 0:peer_as rt:0:peer_as 60082:0:peer_as
Advertise to a peer 60082:client_asn rt:60082:client_asn 60082:1:client_asn
Prepend to a peer 65511:peer_as rt:65511:peer_as 60082:101:peer_as
2 prepends to a peer 65512:peer_as rt:65512:peer_as 60082:102:peer_as
3 prepends to a peer 65513:peer_as rt:65513:peer_as 60082:103:peer_as
Prepend to all 65501:60082 rt:65501:60082 60082:101:0
2 prepends to all 65502:60082 rt:65502:60082 60082:102:0
3 prepends to all 65503:60082 rt:65503:60082 60082:103:0
Blackhole 65535:666 rt:65535:666 60082:666:0
Route-Servers at CATNIX (I)
 They help simplifying the interconnection ( peers without RS vs
n peers with RS).
 Route-servers tell the other ASs where your routes are, but your traffic
does not traverse them (they are in the control plane, not the data plane).
RS1
AS60082
RS2
AS60082
RS3
AS60082
AS64497
I announce
192.0.2.0/24 to the RS
I peer with the RS, I
receive the next-
hop for 192.0.2.0/24
is the router in
AS64496
AS64496
BGP
Data
2
)
1
( 
 n
n
Route-Servers at CATNIX (II)
 The communities are optional attributes to tag the routes, that you can
include in your announcements to make the route-servers take an action
(add prepends, filter announcements, etc).
 All the route-servers apply RPKI filtering (they filter according to the data
in the IRR and the RPKI ROAs).
 Our RSs are MANRS-compliant.
RS1
AS60082
RS2
AS60082
RS3
AS60082
Route-servers at CATNIX (III)
 06-04-2018: First route-server:
• AS60082
• 193.242.98.98/24
• 2001:7f8:2a:0:1:1:6:0082/48
 21-06-2019: Second route server at bitNAP:
• AS60082
• 193.242.98.103/24
• 2001:7F8:2A:0:3:2:6:82/48
 10-10-2019: blackholing service operational
 25-06-2020: Third route-server at Equinix:
• AS60082
• 193.242.98.100/24
• 2001:7f8:2a:0:2:1:6:82 /48
 All the route servers have the blackholing service activated.
Blackholing in CATNIX
CATNIX #39 Nov’18:
To adopt the the RFC 7999 to implement blackholing with
communities in order to signal and stop possible DDoS
attacks traversing the IX.
BLACKHOLE = 0xFFFF029A
To configure the RFC 7999 recommended communities in
the route-servers.
 The low-order two octets in decimal are 666, a value commonly
associated with BGP blackholing among network operators.
 CATNIX members can use this well-known community to stop possible
DDoS attacks traversing the IX.
Blackholing Service
 The blackhole server is at Campus Nord:
• 193.242.98.101/24 in IPv4
• 2001:7F8:002A:0:1:1:6:5666/48 in IPv6
 If you need the route servers to send the traffic of one of your prefixes to
blackhole (close to /32 in IPv4 and /128 in IPv6), label it with:
• The community 65535:666 (0xFFFF029A) or
• The extended community rt:65535:666 or
• The large community 60082:666:0
in the announcements to the route-servers.
• Any traffic you send to the blackhole server will be dropped by the switch at the
L2 level.
Restricted
 Let’s imagine you are AS64496, peering at CATNIX, and you receive
an attack to our IP address 192.0.2.1.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
 Let’s imagine you are AS64496, peering at CATNIX, and you receive
an attack to our IP address 192.0.2.1.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
I announce
192.0.2.0/24 to the RS
 Let’s imagine you are AS64496, peering at CATNIX, and you receive
an attack to our IP address 192.0.2.1.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
I announce
192.0.2.0/24 to the RS
 Let’s imagine you are AS64496, peering at CATNIX, and you receive an
attack to our IP address 192.0.2.1.
 Ask the RSs to send the traffic to the blakhole using the 65535:666
community and the switches will filter the traffic with destination this server.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
I announce
192.0.2.0/24 to the RS
and 192.0.2.1/32 with
the blackholing
community
 Let’s imagine you are AS64496, peering at CATNIX, and you receive an
attack to our IP address 192.0.2.1.
 Ask the RSs to send the traffic to the blakhole using the 65535:666
community and the switches will filter the traffic with destination this server.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
I announce
192.0.2.0/24 to the RS
and 192.0.2.1/32 with
the blackholing
community
 Let’s imagine you are AS64496, peering at CATNIX, and you receive an
attack to our IP address 192.0.2.1.
 Ask the RSs to send the traffic to the blakhole using the 65535:666
community and the switches will filter the traffic with destination this server.
How does it work?
RS1
AS60082
RS2
AS60082
RS3
AS60082
Blackhole
193.242.98.101
Attacker Attacker
Victim
192.0.2.1
AS64496
I announce
192.0.2.0/24 to the RS
and 192.0.2.1/32 with
the blackholing
community
x
Example
 Let’s imagine you are AS64496, peering at CATNIX, and you receive
an attack to our IP address 192.0.2.1. You can ask any of the route-
servers (193.242.98.98, 193.242.98.100, 193.242.98.103) to send the
traffic to the blakhole server and the switches will filter the traffic with
destination this server.
route-map blackhole permit 10
set community 65535:666
router bgp 64496
network 192.0.2.0 mask 255.255.255.0
network 192.0.2.1 mask 255.255.255.255 route-map blackhole
neighbor 193.242.98.98 remote-as 60082
neighbor 193.242.98.98 peer-group CATNIX-RS-IP4
neighbor 193.242.98.98 description EXAMPLE
address-family ipv4
neighbor 193.242.98.98 activate
Other options
 You can tell your peers to send the traffic to the attacked IP directly to
the blackholing server 193.242.98.101. The switches will filter the
traffic with this destination (they must accept that your small prefixes).
RS1
AS60082
RS2
AS60082
Attacker Attacker
x
RS3
AS60082
Blackhole
193.242.98.101
I announce
192.0.2.0/24
and 192.0.2.1/32 with
the blackholing
community to my peers
Other options
 You can tell your peers to send the traffic to the attacked IP directly to
the blackholing server 193.242.98.101. The switches will filter the
traffic with this destination (they must accpt that your small prefixes).
RS1
AS60082
RS2
AS60082
Attacker Attacker
I announce
192.0.2.0/24
and 192.0.2.1/32 with
next-hop
193.242.98.101 to my
peers
x
RS3
AS60082
Blackhole
193.242.98.101
Thank you for your attention!
mariaisabel.gandia@csuc.cat

More Related Content

What's hot

Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guideAbel Saduwa
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layerRonoh Kennedy
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocolAtakan ATAK
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocolsassinha
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFAtakan ATAK
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesEricsson
 

What's hot (20)

Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocol
 
Routing
RoutingRouting
Routing
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
Network layer
Network layerNetwork layer
Network layer
 
Link State Protocol
Link State ProtocolLink State Protocol
Link State Protocol
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - Services
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 

Similar to Communities and DDoS Mitigation at CATNIX

SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfpradeeppotter
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheetSwarup Hait
 
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing Security
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing SecurityNetmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing Security
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing SecurityFaelix Ltd
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatDigicomp Academy AG
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoNMwendwa Kivuva
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing TechniquesTusharadri Sarkar
 
VYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edgeVYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edgeFaelix Ltd
 
Seqüestro de dados na Internet
Seqüestro de dados na InternetSeqüestro de dados na Internet
Seqüestro de dados na InternetJoão S Magalhães
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsMahmmoud Mahdi
 
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASN
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASNPLNOG 3: Klaudiusz Staniek - 4-Bytes ASN
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASNPROIDEA
 

Similar to Communities and DDoS Mitigation at CATNIX (20)

SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Multicast address
Multicast addressMulticast address
Multicast address
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdf
 
IPv6
IPv6IPv6
IPv6
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing Security
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing SecurityNetmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing Security
Netmcr 40 - Salt + Netbox + Vyos = Network Automation + Routing Security
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
IPv6
IPv6IPv6
IPv6
 
10 routing-bgp
10 routing-bgp10 routing-bgp
10 routing-bgp
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
IPv6 im Jahre 2018
IPv6 im Jahre 2018IPv6 im Jahre 2018
IPv6 im Jahre 2018
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing Techniques
 
IPV6 IPv6 Routing Lab By Rob Hamm
IPV6 IPv6 Routing Lab  By Rob HammIPV6 IPv6 Routing Lab  By Rob Hamm
IPV6 IPv6 Routing Lab By Rob Hamm
 
VYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edgeVYOS & RPKI at the BGP as edge
VYOS & RPKI at the BGP as edge
 
Seqüestro de dados na Internet
Seqüestro de dados na InternetSeqüestro de dados na Internet
Seqüestro de dados na Internet
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASN
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASNPLNOG 3: Klaudiusz Staniek - 4-Bytes ASN
PLNOG 3: Klaudiusz Staniek - 4-Bytes ASN
 

More from CSUC - Consorci de Serveis Universitaris de Catalunya

More from CSUC - Consorci de Serveis Universitaris de Catalunya (20)

Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
 
Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)
 
Publicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de RecercaPublicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de Recerca
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
 
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
 
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
 
Security Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademySecurity Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademy
 
The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
 
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
 
La gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolas
 
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
 
Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...
 
Enginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fonsEnginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fons
 
Transformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IATransformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IA
 
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de BarcelonaDifusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
 
Fons de discos perforats de cartró
Fons de discos perforats de cartróFons de discos perforats de cartró
Fons de discos perforats de cartró
 
Biblioteca Digital Gencat
Biblioteca Digital GencatBiblioteca Digital Gencat
Biblioteca Digital Gencat
 
El fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusióEl fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusió
 
El CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físicsEl CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físics
 
Els serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUCEls serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUC
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Communities and DDoS Mitigation at CATNIX

  • 1. Communities and DDoS Mitigation at CATNIX Maria Isabel Gandía Carriedo CSUC/CATNIX 26-11-2021
  • 2. History and RFCs (I) 1994 1995 1996 1998 2004 1982 1984 1989 1990 1991 GGP (RFC 823) EGP (RFC 827) EGP (RFC 888/904) BGPv1 (RFC 1105) BGPv2 (RFC1163) BGPv3 (RFC 1267) BGPv4 (RFC1654) BGPv4 (RFC 1771) Communities (RFC1997) MP-BGP (RFC2283) NOPEER Community (RFC3765)
  • 3. History and RFCs (II) 2016 2017 2017 2018 2021 2006 2006 2007 2009 2014 BGP Support for Four-octet AS Number Space (RFC 4893) 4-Octet AS Specific BGP Extended Community (RFC 5668) Blackhole community (RFC 7999) Use of BGP large communities (RFC 8195) Extended Communities (RFC4360) BGP large communities (RFC 8092) Graceful BGP Session Shutdown (RFC 8326) BGPv4 CIDR (RFC4271) IANA Registries for Extended Communities (RFC4360) Extended Optional Parameters for BGP Open Message (RFC 9072)
  • 4. IANA BGP Well-Known Communities https://www.iana.org/assignments/bgp-well-known-communities/bgp-well-known-communities.xhtml Attribute Value Attribute Reference 0x00000000-0x0000FFFF Reserved [RFC1997] 0x00010000-0xFFFEFFFF Reserved for Private Use [RFC1997] 0xFFFF0000 GRACEFUL_SHUTDOWN [RFC8326] 0xFFFF0001 ACCEPT_OWN [RFC7611] 0xFFFF0002 ROUTE_FILTER_TRANSLATED_v4 [draft-l3vpn-legacy-rtc] 0xFFFF0003 ROUTE_FILTER_v4 [draft-l3vpn-legacy-rtc] 0xFFFF0004 ROUTE_FILTER_TRANSLATED_v6 [draft-l3vpn-legacy-rtc] 0xFFFF0005 ROUTE_FILTER_v6 [draft-l3vpn-legacy-rtc] 0xFFFF0006 LLGR_STALE [draft-uttaro-idr-bgp-persistence] 0xFFFF0007 NO_LLGR [draft-uttaro-idr-bgp-persistence] 0xFFFF0008 accept-own-nexthop [draft-agrewal-idr-accept-own- nexthop] 0xFFFF0009 Standby PE [RFC9026] 0xFFFF000A-0xFFFF0299 Unassigned 0xFFFF029A BLACKHOLE [RFC7999] 0xFFFF029B-0xFFFFFF00 Unassigned 0xFFFFFF01 NO_EXPORT [RFC1997] 0xFFFFFF02 NO_ADVERTISE [RFC1997] 0xFFFFFF03 NO_EXPORT_SUBCONFED [RFC1997] 0xFFFFFF04 NOPEER [RFC3765] 0xFFFFFF05-0xFFFFFFFF Unassigned
  • 5. Communities – Well-known and Not-so-well-known  Created to facilitate and simplify the control of routing information.  A community “classifies” routes.  Each AS can define to which communities a network belongs.  A router (BGP speaker) can modify the communities according to its own policy.  Usign them to indicate local-preferences is quite common. Communities for some companies at https://onestep.net/communities/
  • 6. Communities at CATNIX ACTION BGP Standard Community (RFC 1997) BGP Extended Community (RFC 4360) BGP Large Community (RFC 8092) No export 65535:65281 rt:65281:peer_as 65535:65281:peer_as No advertise 65535:65282 rt:65282:peer_as 65535:65282:peer_as No advertise to anybody 0:60082 rt:0:60082 60082:0:0 No advertise to a peer 0:peer_as rt:0:peer_as 60082:0:peer_as Advertise to a peer 60082:client_asn rt:60082:client_asn 60082:1:client_asn Prepend to a peer 65511:peer_as rt:65511:peer_as 60082:101:peer_as 2 prepends to a peer 65512:peer_as rt:65512:peer_as 60082:102:peer_as 3 prepends to a peer 65513:peer_as rt:65513:peer_as 60082:103:peer_as Prepend to all 65501:60082 rt:65501:60082 60082:101:0 2 prepends to all 65502:60082 rt:65502:60082 60082:102:0 3 prepends to all 65503:60082 rt:65503:60082 60082:103:0 Blackhole 65535:666 rt:65535:666 60082:666:0
  • 7. Route-Servers at CATNIX (I)  They help simplifying the interconnection ( peers without RS vs n peers with RS).  Route-servers tell the other ASs where your routes are, but your traffic does not traverse them (they are in the control plane, not the data plane). RS1 AS60082 RS2 AS60082 RS3 AS60082 AS64497 I announce 192.0.2.0/24 to the RS I peer with the RS, I receive the next- hop for 192.0.2.0/24 is the router in AS64496 AS64496 BGP Data 2 ) 1 (   n n
  • 8. Route-Servers at CATNIX (II)  The communities are optional attributes to tag the routes, that you can include in your announcements to make the route-servers take an action (add prepends, filter announcements, etc).  All the route-servers apply RPKI filtering (they filter according to the data in the IRR and the RPKI ROAs).  Our RSs are MANRS-compliant. RS1 AS60082 RS2 AS60082 RS3 AS60082
  • 9. Route-servers at CATNIX (III)  06-04-2018: First route-server: • AS60082 • 193.242.98.98/24 • 2001:7f8:2a:0:1:1:6:0082/48  21-06-2019: Second route server at bitNAP: • AS60082 • 193.242.98.103/24 • 2001:7F8:2A:0:3:2:6:82/48  10-10-2019: blackholing service operational  25-06-2020: Third route-server at Equinix: • AS60082 • 193.242.98.100/24 • 2001:7f8:2a:0:2:1:6:82 /48  All the route servers have the blackholing service activated.
  • 10. Blackholing in CATNIX CATNIX #39 Nov’18: To adopt the the RFC 7999 to implement blackholing with communities in order to signal and stop possible DDoS attacks traversing the IX. BLACKHOLE = 0xFFFF029A To configure the RFC 7999 recommended communities in the route-servers.  The low-order two octets in decimal are 666, a value commonly associated with BGP blackholing among network operators.  CATNIX members can use this well-known community to stop possible DDoS attacks traversing the IX.
  • 11. Blackholing Service  The blackhole server is at Campus Nord: • 193.242.98.101/24 in IPv4 • 2001:7F8:002A:0:1:1:6:5666/48 in IPv6  If you need the route servers to send the traffic of one of your prefixes to blackhole (close to /32 in IPv4 and /128 in IPv6), label it with: • The community 65535:666 (0xFFFF029A) or • The extended community rt:65535:666 or • The large community 60082:666:0 in the announcements to the route-servers. • Any traffic you send to the blackhole server will be dropped by the switch at the L2 level. Restricted
  • 12.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496
  • 13.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496 I announce 192.0.2.0/24 to the RS
  • 14.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496 I announce 192.0.2.0/24 to the RS
  • 15.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1.  Ask the RSs to send the traffic to the blakhole using the 65535:666 community and the switches will filter the traffic with destination this server. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496 I announce 192.0.2.0/24 to the RS and 192.0.2.1/32 with the blackholing community
  • 16.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1.  Ask the RSs to send the traffic to the blakhole using the 65535:666 community and the switches will filter the traffic with destination this server. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496 I announce 192.0.2.0/24 to the RS and 192.0.2.1/32 with the blackholing community
  • 17.  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1.  Ask the RSs to send the traffic to the blakhole using the 65535:666 community and the switches will filter the traffic with destination this server. How does it work? RS1 AS60082 RS2 AS60082 RS3 AS60082 Blackhole 193.242.98.101 Attacker Attacker Victim 192.0.2.1 AS64496 I announce 192.0.2.0/24 to the RS and 192.0.2.1/32 with the blackholing community x
  • 18. Example  Let’s imagine you are AS64496, peering at CATNIX, and you receive an attack to our IP address 192.0.2.1. You can ask any of the route- servers (193.242.98.98, 193.242.98.100, 193.242.98.103) to send the traffic to the blakhole server and the switches will filter the traffic with destination this server. route-map blackhole permit 10 set community 65535:666 router bgp 64496 network 192.0.2.0 mask 255.255.255.0 network 192.0.2.1 mask 255.255.255.255 route-map blackhole neighbor 193.242.98.98 remote-as 60082 neighbor 193.242.98.98 peer-group CATNIX-RS-IP4 neighbor 193.242.98.98 description EXAMPLE address-family ipv4 neighbor 193.242.98.98 activate
  • 19. Other options  You can tell your peers to send the traffic to the attacked IP directly to the blackholing server 193.242.98.101. The switches will filter the traffic with this destination (they must accept that your small prefixes). RS1 AS60082 RS2 AS60082 Attacker Attacker x RS3 AS60082 Blackhole 193.242.98.101 I announce 192.0.2.0/24 and 192.0.2.1/32 with the blackholing community to my peers
  • 20. Other options  You can tell your peers to send the traffic to the attacked IP directly to the blackholing server 193.242.98.101. The switches will filter the traffic with this destination (they must accpt that your small prefixes). RS1 AS60082 RS2 AS60082 Attacker Attacker I announce 192.0.2.0/24 and 192.0.2.1/32 with next-hop 193.242.98.101 to my peers x RS3 AS60082 Blackhole 193.242.98.101
  • 21. Thank you for your attention! mariaisabel.gandia@csuc.cat

Editor's Notes

  1. 1982: GGP, gateway-to-gateway protocol (desarrollado por BBN y parcialmente definido en RFC823) 1982: primera propuesta de EGP, Exterior Gateway Protocol (RFC827) 1984: “STUB” Exterior Gateway Protocol para routers de core (RFC888) 1984: se define EGP, Exterior Gateway Protocol (RFC 904) 1988: RIP (RFC1058) 1989: BGP (v1) para intercambiar información entre AS (RFC 1105). Se crean los primeros puntos neutros. 1990: BGPv2 (RFC1163) 1991: BGPv3 (RFC 1267) 1994: BGPv4 (RFC1654) 1994: IPv6 BGP (RFC1883) 1995: Revisión de BGPv4 (RFC 1771) 1996: se crean las communities (RFC1997) 1998: extensiones multiprotocolo (p.e, IPv6) para BGP (RFC2283) 2006: Revisión BGPv4 con CIDR, (RFC4271)
  2. 2006: Revisión BGPv4 con CIDR, (RFC4271) The first 2 are the AS number. 2 more to classify the route. But 4-bytes AS appeared... ...and extended communities didn’t work well (even if they have 8 bytes, there were only 2 for the AS)  Large BGP communities Un espacio único para AS de 16 y de 32 bits Sin colisiones entre ASNs Las large communities se codifican en 96 bits (12 bytes): “AS 32-bit:valor 32-bit:valor 32-bit” La representación canónica es $Me:$Action:$You
  3. Comunidades informativas Etiquetas informativas para marcar rutas con: Código de origen geográfco (ISO 3166-1 y UN M.49) Relación de propagación (interna, cliente, peer, tránsito) Da información de debugging o planificación de capacidad. El campo Global Administrator es el ASN que etiqueta las rutas. Comunidades de acción Indica de qué forma debe ser tratada una ruta: Características de propagación (export, selective export, no export) Local preference: influencia al tráfico de entrada dentro del AS. AS Path: influencia el tráfico desde fuera del AS. El campo Global Administrator es el ASN que ha definido la funcionalidad de la community. Útil para proveedores de tránsito que deben ejecutar acciones en nombre de un cliente.
  4. Añadir que es un atributo transitivo
  5. Añadir que es un atributo transitivo