SlideShare a Scribd company logo
Broder Gateway Protocol (BGP)Broder Gateway Protocol (BGP)
“Border gateway protocol is how the internet routes traffic”
1969 – First Internet MSG (Login->Lo), 1984 – EGP when cisco Found, 1988 – RIP, 1990 & 1995 - BGP
K.Satheesh
CCIE R/S
Senior Network Consultant
At the End of this Presentation
Will be able to understand
• What is BGP?
• Why BGP?
• BGP Peer Relationships
• Configuration of BGP
• BGP attributes and Path Selection
• BGP use cases
Why Routing protocol ?
• Routing: Enable communication between two
different Networks.
• To Exchange network reachability information
• To have resiliency when failure occur
• Have multipath and optimize path
• Etc ..
What is BGP
• Broder Gateway Protocol – BGP
• Defined by IETF RFC 1771
• Work Based on Autonomous System No – AS#
– 2 Byte : 2^16 -> 0 – 65535
– 4 Byte : 2^32 -> 0 - 4294967295
• Version 4 is the latest for both IPv4 and IPv6
• It works on top of TCP
AS# Ranges
2 Byte AS till 2009 / 0 to 65535
• 0: reserved.
• 1-64495: public AS numbers.
• 64496 – 64511 – reserved to use in documentation.
• 64512 – 65534 – private AS numbers.
• 65535 – reserved
4 Byte AS after 2009 / 65536 to 4294967295
• Private: 4200000000 - 4294967294
4200000000 - 4294967294
4200000000 - 4294967294
BGP
• Path Vector Protocol
• Incremental Updates
• Many options for policy enforcement
• Classless Inter Domain Routing (CIDR)
• Widely used for Internet backbone
• Autonomous systems
BGP Routing Table Size
Autonomous System - AS
AS 100
• Collection of networks with same routing policy
• Single routing protocol
• Usually under single ownership, trust and
administrative control
Path Vector and AS-PATH
• Path Vector Protocol – Define a route as parting
between destination and it’s attributes.
12.6.126.0/24 207.126.96.43 1021 0 6461 7018 6337 11268 i
Path Vector and AS-PATH
AS 100
AS 300
AS 200
AS 500
AS 400
170.10.0.0/16 180.10.0.0/16
150.10.0.0/16
180.10.0.0/16 300 200 100
170.10.0.0/16 300 200
150.10.0.0/16 300 400
180.10.0.0/16 300 200 100
170.10.0.0/16 300 200
AS PATH LOOP DETECTION
AS 100
AS 300
AS 200
AS 500
170.10.0.0/16 180.10.0.0/16
180.10.0.0/16300 200 100
180.10.0.0/16100
170.10.0.0/16300 200
140.10.0.0/16300
140.10.0.0/16500 300
170.10.0.0/16500 300 200
140.10.0.0/16
180.10.0.0/16 is not announced to
AS100 as AS500 sees that it is
originated from AS100, and that
AS100 is the neighbouring AS –
loop detection in action
BGP General Operations
180.10.0.0/16300 200 100
180.10.0.0/16100
170.10.0.0/16300 200
140.10.0.0/16300
• Learns multiple paths via internal and external
BGP speakers
• Picks the best path and installs in
the forwarding table
• Policies applied by influencing the
best path selection
BGP Peering
AS
100
AS
101
AS
102
E
B D
A C
Peering
BGP speakers are called
peers
External BGP Peering(eBGP)
• Between BGP speakers in different AS
• Should be directly connected
• Do not run an IGP between eBGP peers
AS
100
AS
101C
A
B
Internal BGP Peering(iBGP)
• Topology independent
• Each iBGP speaker must peer with every
other iBGP speaker in the AS
AS
100
A
E
B
D
iBGP Rules
• BGP peer within the same AS
• Not required to be directly connected
• iBGP speakers need to be fully meshed
– they originate connected networks
– they do not pass on prefixes learned
from other iBGP speakers
BGP Messages
Type Name Functional Overview
1 OPEN Sets up and establishes BGP adjacency
2 UPDATE
Advertises, updates, or withdraws
routes
3 NOTIFICATION
Indicates an error condition to a BGP
neighbor
4 KEEPALIVE
Ensures that BGP neighbors are still
alive
BGP Timers
• 30s Keep Alive and 180s Hold Timer
• BGP Advertisement Timer
– 30s for eBGP
– 0s for iBGP
BGP States
BGP forms tcp session between routers- Peers
 Idle: Try to initiate tcp connection and listen
 Connect: tcp 3-way handshake establish
 Active: New tcp 3-wak handshake, if timer expires
 OpenSent: Send an Open message and wait for same
o Compare Ver, AS#, Authentication, IP and AUTH
 OpenConfirm : wait for Keep Alive, then move to EST
 Established: Exchange routes via Update Msgs
eBGP Configuration
R1(config)#router bgp 1
R1(config-router)#neighbor 11.0.0.2 remote-as 2
R2(config)#router bgp 2
R2(config-router)#neighbor 11.0.0.1 remote-as 1
192.168.1.0/24 172.16.19.0/24
R1(config)#router bgp 1
R1(config-router)#network 192.168.1.0 mask 255.255.255.0
R2(config)#router bgp 1
R2(config-router)#network 172.16.19.0 mask 255.255.255.0
BGP Attributes and Path Selection
• Weight : Local to Router
• Local preference : Local to AS
• AS_path
• Origin
• Multi-exit discriminator
• Community
Routes learned via BGP have associated properties that
are used to determine the best route to a destination
when multiple paths exist to a particular destination.
BGP Attributes and Path Selection
BGP Attributes and Path Selection
BGP Attributes and Path Selection
BGP Use Cases
• Multihoming / Provider redundancy
• Equipment / Port redundancy
• Peering (typically larger ASes)
• Connectivity quality (better paths)
Bgp

More Related Content

What's hot

OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)
NetProtocol Xpert
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
ThousandEyes
 
Route Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRPRoute Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRP
NetProtocol Xpert
 
Routing Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. MikrotikRouting Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. Mikrotik
KHNOG
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
 
Ospf
OspfOspf
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
Nutan Singh
 
Computer network (14)
Computer network (14)Computer network (14)
Computer network (14)
NYversity
 
OSPF- Multi area
OSPF- Multi area OSPF- Multi area
OSPF- Multi area
Ahmed Ali
 
Ospf
OspfOspf
Ospf
Alp isik
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 
CCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrpCCNA part 6 igrp,ospf,eigrp
5242 bgp-ospf-redis
5242 bgp-ospf-redis5242 bgp-ospf-redis
5242 bgp-ospf-redis
Andrei Alexandru
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
NetProtocol Xpert
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
Siddhi Viradiya
 
BGP Loop Prevention
BGP Loop Prevention BGP Loop Prevention
BGP Loop Prevention
NetProtocol Xpert
 
BGP Next-hop-self
BGP Next-hop-selfBGP Next-hop-self
BGP Next-hop-self
NetProtocol Xpert
 

What's hot (20)

OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Route Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRPRoute Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRP
 
Routing Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. MikrotikRouting Implementation - Cisco vs. Mikrotik
Routing Implementation - Cisco vs. Mikrotik
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
Ospf
OspfOspf
Ospf
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
 
Computer network (14)
Computer network (14)Computer network (14)
Computer network (14)
 
OSPF- Multi area
OSPF- Multi area OSPF- Multi area
OSPF- Multi area
 
Ospf
OspfOspf
Ospf
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
CCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrpCCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrp
 
5242 bgp-ospf-redis
5242 bgp-ospf-redis5242 bgp-ospf-redis
5242 bgp-ospf-redis
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
 
BGP Loop Prevention
BGP Loop Prevention BGP Loop Prevention
BGP Loop Prevention
 
BGP Next-hop-self
BGP Next-hop-selfBGP Next-hop-self
BGP Next-hop-self
 

Similar to Bgp

bgp.ppt
bgp.pptbgp.ppt
bgp.ppt
aozcan1
 
Bgp
BgpBgp
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
MyNOG
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
Shashank Asthana
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
Chaing Ravuth
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
MoctardOLOULADE
 
10 routing-bgp
10 routing-bgp10 routing-bgp
10 routing-bgp
Olivier Bonaventure
 
Bgp Toc
Bgp TocBgp Toc
Bgp Toc
bigb0206
 
T4 Handout3
T4 Handout3T4 Handout3
T4 Handout3gobed
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
ManuelRojas960410
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
APNIC
 
Demystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the HostDemystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the Host
Cumulus Networks
 
Cumulus Linux 2.5.3
Cumulus Linux 2.5.3Cumulus Linux 2.5.3
Cumulus Linux 2.5.3
Cumulus Networks
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
Vishal Sharma, Ph.D.
 
Bgp
BgpBgp

Similar to Bgp (20)

Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
 
bgp.ppt
bgp.pptbgp.ppt
bgp.ppt
 
Bgp
BgpBgp
Bgp
 
Bigbgp
BigbgpBigbgp
Bigbgp
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
10 routing-bgp
10 routing-bgp10 routing-bgp
10 routing-bgp
 
Bgp Toc
Bgp TocBgp Toc
Bgp Toc
 
Bigbgp (1)
Bigbgp (1)Bigbgp (1)
Bigbgp (1)
 
T4 Handout3
T4 Handout3T4 Handout3
T4 Handout3
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
 
Lec7
Lec7Lec7
Lec7
 
Demystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the HostDemystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the Host
 
Cumulus Linux 2.5.3
Cumulus Linux 2.5.3Cumulus Linux 2.5.3
Cumulus Linux 2.5.3
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
Bgp
BgpBgp
Bgp
 
CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Bgp

  • 1. Broder Gateway Protocol (BGP)Broder Gateway Protocol (BGP) “Border gateway protocol is how the internet routes traffic” 1969 – First Internet MSG (Login->Lo), 1984 – EGP when cisco Found, 1988 – RIP, 1990 & 1995 - BGP K.Satheesh CCIE R/S Senior Network Consultant
  • 2. At the End of this Presentation Will be able to understand • What is BGP? • Why BGP? • BGP Peer Relationships • Configuration of BGP • BGP attributes and Path Selection • BGP use cases
  • 3. Why Routing protocol ? • Routing: Enable communication between two different Networks. • To Exchange network reachability information • To have resiliency when failure occur • Have multipath and optimize path • Etc ..
  • 4. What is BGP • Broder Gateway Protocol – BGP • Defined by IETF RFC 1771 • Work Based on Autonomous System No – AS# – 2 Byte : 2^16 -> 0 – 65535 – 4 Byte : 2^32 -> 0 - 4294967295 • Version 4 is the latest for both IPv4 and IPv6 • It works on top of TCP
  • 5. AS# Ranges 2 Byte AS till 2009 / 0 to 65535 • 0: reserved. • 1-64495: public AS numbers. • 64496 – 64511 – reserved to use in documentation. • 64512 – 65534 – private AS numbers. • 65535 – reserved 4 Byte AS after 2009 / 65536 to 4294967295 • Private: 4200000000 - 4294967294 4200000000 - 4294967294 4200000000 - 4294967294
  • 6. BGP • Path Vector Protocol • Incremental Updates • Many options for policy enforcement • Classless Inter Domain Routing (CIDR) • Widely used for Internet backbone • Autonomous systems
  • 8. Autonomous System - AS AS 100 • Collection of networks with same routing policy • Single routing protocol • Usually under single ownership, trust and administrative control
  • 9. Path Vector and AS-PATH • Path Vector Protocol – Define a route as parting between destination and it’s attributes. 12.6.126.0/24 207.126.96.43 1021 0 6461 7018 6337 11268 i
  • 10. Path Vector and AS-PATH AS 100 AS 300 AS 200 AS 500 AS 400 170.10.0.0/16 180.10.0.0/16 150.10.0.0/16 180.10.0.0/16 300 200 100 170.10.0.0/16 300 200 150.10.0.0/16 300 400 180.10.0.0/16 300 200 100 170.10.0.0/16 300 200
  • 11. AS PATH LOOP DETECTION AS 100 AS 300 AS 200 AS 500 170.10.0.0/16 180.10.0.0/16 180.10.0.0/16300 200 100 180.10.0.0/16100 170.10.0.0/16300 200 140.10.0.0/16300 140.10.0.0/16500 300 170.10.0.0/16500 300 200 140.10.0.0/16 180.10.0.0/16 is not announced to AS100 as AS500 sees that it is originated from AS100, and that AS100 is the neighbouring AS – loop detection in action
  • 12. BGP General Operations 180.10.0.0/16300 200 100 180.10.0.0/16100 170.10.0.0/16300 200 140.10.0.0/16300 • Learns multiple paths via internal and external BGP speakers • Picks the best path and installs in the forwarding table • Policies applied by influencing the best path selection
  • 13. BGP Peering AS 100 AS 101 AS 102 E B D A C Peering BGP speakers are called peers
  • 14. External BGP Peering(eBGP) • Between BGP speakers in different AS • Should be directly connected • Do not run an IGP between eBGP peers AS 100 AS 101C A B
  • 15. Internal BGP Peering(iBGP) • Topology independent • Each iBGP speaker must peer with every other iBGP speaker in the AS AS 100 A E B D
  • 16. iBGP Rules • BGP peer within the same AS • Not required to be directly connected • iBGP speakers need to be fully meshed – they originate connected networks – they do not pass on prefixes learned from other iBGP speakers
  • 17. BGP Messages Type Name Functional Overview 1 OPEN Sets up and establishes BGP adjacency 2 UPDATE Advertises, updates, or withdraws routes 3 NOTIFICATION Indicates an error condition to a BGP neighbor 4 KEEPALIVE Ensures that BGP neighbors are still alive
  • 18. BGP Timers • 30s Keep Alive and 180s Hold Timer • BGP Advertisement Timer – 30s for eBGP – 0s for iBGP
  • 19. BGP States BGP forms tcp session between routers- Peers  Idle: Try to initiate tcp connection and listen  Connect: tcp 3-way handshake establish  Active: New tcp 3-wak handshake, if timer expires  OpenSent: Send an Open message and wait for same o Compare Ver, AS#, Authentication, IP and AUTH  OpenConfirm : wait for Keep Alive, then move to EST  Established: Exchange routes via Update Msgs
  • 20. eBGP Configuration R1(config)#router bgp 1 R1(config-router)#neighbor 11.0.0.2 remote-as 2 R2(config)#router bgp 2 R2(config-router)#neighbor 11.0.0.1 remote-as 1 192.168.1.0/24 172.16.19.0/24 R1(config)#router bgp 1 R1(config-router)#network 192.168.1.0 mask 255.255.255.0 R2(config)#router bgp 1 R2(config-router)#network 172.16.19.0 mask 255.255.255.0
  • 21. BGP Attributes and Path Selection • Weight : Local to Router • Local preference : Local to AS • AS_path • Origin • Multi-exit discriminator • Community Routes learned via BGP have associated properties that are used to determine the best route to a destination when multiple paths exist to a particular destination.
  • 22. BGP Attributes and Path Selection
  • 23. BGP Attributes and Path Selection
  • 24. BGP Attributes and Path Selection
  • 25. BGP Use Cases • Multihoming / Provider redundancy • Equipment / Port redundancy • Peering (typically larger ASes) • Connectivity quality (better paths)