SlideShare a Scribd company logo
1 of 26
Border Gateway
                                 Protocol (BGP)
                              KAREN Technical Workshop
                                          François Prowse
                                      fprowse@juniper.net




Copyright © 2006 Juniper Networks, Inc.                     Proprietary and Confidential   www.juniper.net   1
BGP Basics



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.               Proprietary and Confidential
                                                    Proprietary and Confidential   www.juniper.net
                                                                                    www.juniper.net   2
What is BGP?
       BGP is the routing protocol used to advertise routes between
        institutions and the KAREN network

       More than just a routing protocol, BGP routes contain many additional
        attributes

       Controlled by flexible “Policy” rules that limit what routes we will learn
        and what we will advertise

       BGP policy is traditionally used as an interpretation of commercial
        arrangements between carriers, ISP’s etc

       BGP can be as simple or as complex as you wish



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                     Proprietary and Confidential
                                                          Proprietary and Confidential   www.juniper.net
                                                                                          www.juniper.net   3
What RFC’s define BGP?
       RFC 1771 - A Border Gateway Protocol 4 (BGP-4)
       RFC 1772 - Application of the Border Gateway Protocol in the Internet
       RFC 1997 - BGP Communities Attribute
       RFC 1965 - Autonomous System Confederations for BGP
       RFC 1966 - BGP Route Reflection. An alternative to full mesh IBGP
       RFC 2270 - Using a Dedicated AS for Sites Homed to a Single Provider
       RFC 2283 - Multiprotocol Extensions for BGP-4
       RFC 2385 - Protection of BGP Sessions via the TCP MD5 Signature Option
       RFC 2439 - BGP Route Flap Damping
       RFC 2545 - Multiprotocol Extensions for IPv6 Inter-Domain Routing




Copyright © 2003 Juniper Networks, Inc.                  Proprietary and Confidential   www.juniper.net   4
Routing Protocols
       IGP – Interior Gateway protocol
             • Figures optimal path from one node to another node in a network
             • Examples include RIP, OSPF, ISIS etc…
             • Runs under a single technical/administrative control (AS)
             • Can support either IPv4 and/or IPv6


       EGP – Exterior Gateway protocols
             • Allows different AS’s to exchange routing information to allow traffic
               across two different areas of control
             • Only one EGP used in the KAREN network -> BGP
             • Policy allows Peers to control routes leant between sites based on
               established agreements
             • Best practice is to only advertise the routes you wish people to actually
               reach.



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                             Proprietary and Confidential
                                                                  Proprietary and Confidential   www.juniper.net
                                                                                                  www.juniper.net   5
IGP – Interior Gateway protocol
       Each AS maintains their own IGP
       There is no interaction of IGP’s between any peers in the KAREN
        network
       IGP’s are required to allow routing inside a domain
       Examples include
             • Static routes
             • RIP
             • RIPng                       IPv6 capable
             • OSPF
             • OSPFv3                      IPv6 capable
             • ISIS                        IPv6 capable
             • Other proprietary protocols 




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                     Proprietary and Confidential
                                                          Proprietary and Confidential   www.juniper.net
                                                                                          www.juniper.net   6
EGP – Exterior Gateway protocol
       BGP Can be used in two scenarios
             • Internally, inside an Autonomous System
                        • Known as IBGP    (Internal BGP)
                        • Peers share the same AS number
                        • Typically implemented as a full mesh
                        • Typically peer between loopback addresses
             • Externally, between peers
                        • Known as EBGP (External BGP)
                        • Peers have different AS numbers
                        • Single point-to-point peering
                        • Typically peer between interface addresses


       All connections to the KAREN network use EBGP



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                  Proprietary and Confidential
                                                                       Proprietary and Confidential   www.juniper.net
                                                                                                       www.juniper.net   7
IBGP – Full mesh, on top of IGP




            KAREN                                                          Internet

                                           AS 12345



                                            IBGP Peering




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                      Proprietary and Confidential
                                                           Proprietary and Confidential   www.juniper.net
                                                                                           www.juniper.net   8
EBGP, Peering to the Internet and KAREN




            KAREN                                                          Internet

                                           AS 12345



                                            EBGP Peering




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                      Proprietary and Confidential
                                                           Proprietary and Confidential   www.juniper.net
                                                                                           www.juniper.net   9
IBGP and EBGP in operation




            KAREN                                                          Internet

                                           AS 12345



                                            IBGP Peering
                                            EBGP Peering



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                      Proprietary and Confidential
                                                           Proprietary and Confidential   www.juniper.net
                                                                                           www.juniper.net   10
                                                                                                             10
BGP Protocol Overview
       BGP Runs over TCP


       Any two routers that have formed a TCP connection to exchange BGP
        information are called “Peers” or ‘Neighbors”


       Once connection is made, Peers exchange their full BGP routing tables.


       Updates are then sent as the table changes or new routes are added to the
        network.


       BGP peers in the KAREN network should be capable of exhanging both IPv4
        and IPv6 routes




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                        Proprietary and Confidential
                                                             Proprietary and Confidential   www.juniper.net
                                                                                             www.juniper.net   11
                                                                                                               11
BGP Routes
       BGP routes contain more that just the advertised prefix
             • Origin
             • AS Path
             • Next Hop
             • Local Preference
             • Multiple Exit Discriminator
             • Community


       BGP Policy looks at the prefix as well as route attributes for decision making


       BGP attributes can often be changed to influence downstream policy




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                         Proprietary and Confidential
                                                              Proprietary and Confidential   www.juniper.net
                                                                                              www.juniper.net   12
                                                                                                                12
Autonomous System
       Autonomous System (AS)
             • Group of routers belonging to a single administrative domain
             • Viewed externally as a single, coherent interior routing domain
             • Each AS runs their own chosen IGP


       AS Numbers
             • Public and private AS numbers are available for use
             • Public numbers assigned locally by APNIC to each institution
             • Larger tertiary institutions potentially already have one assigned


       You will need a Publicly Assigned AS number to connect to KAREN!




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                    Proprietary and Confidential
                                                                         Proprietary and Confidential   www.juniper.net
                                                                                                         www.juniper.net   13
                                                                                                                           13
BGP Policy



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.               Proprietary and Confidential
                                                    Proprietary and Confidential   www.juniper.net
                                                                                    www.juniper.net   14
                                                                                                      14
BGP Policy
       BGP Policy controls what BGP routes are installed in the routers routing table
        and what routes are advertised to your peers


       Use BGP policy when
             • You don’t want to import all learned routes into the routing table
             • You don’t want to advertise all known routes to neighboring routers
             • You want BGP to receive routes from another protocol (Redistribution)
             • You want to modify information (BGP Attributes) associated with routes


       BGP Policy configuration varies with each router vendor and platform


       BGP Policy can be as simple or as complex as you wish


       Ensure your routers policy implementation is as flexible as possible



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                    Proprietary and Confidential
                                                                         Proprietary and Confidential   www.juniper.net
                                                                                                         www.juniper.net   15
                                                                                                                           15
Default Policy
       BGP when left to its own devices will fall back to default policy for the import
        and export of routes.


       Can vary with vendor implementation


       Import
             • All routes learned from BGP neighbors are installed in the routing table


       Export
             • Transmit all routes learned from BGP neighbors to all BGP neighbors
             • Advertise only active route


       If you aren’t running IBGP in your network then you will need policy to
        redistribute IGP routes to KAREN



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                   Proprietary and Confidential
                                                                        Proprietary and Confidential   www.juniper.net
                                                                                                        www.juniper.net   16
                                                                                                                          16
Import and Export Policy
       Control the flow of routes between your network and KAREN by creating
        specific policy rules!


       Import Policy
             • Apply an import routing policy to control the routes that the routing protocol
               process uses to determine active routes
             • Affects routes that BGP receives from a neighbor
             • Modify BGP attributes


       Export Policy
             • Apply an export routing policy to control the routes that a BGP router advertises to
               its neighbor
             • Modify BGP attributes




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                   Proprietary and Confidential
                                                                        Proprietary and Confidential   www.juniper.net
                                                                                                        www.juniper.net   17
                                                                                                                          17
Why do we need policy




                                           200.0.0.0/24
                                           192.168.0.0/24

            KAREN                                                               Internet

                                           AS 12345


              200.0.0.0/24                                  200.0.0.0/24
              192.168.0.0/24                                192.168.0.0/24




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                           Proprietary and Confidential
                                                                Proprietary and Confidential   www.juniper.net
                                                                                                www.juniper.net   18
                                                                                                                  18
Policy enforcement
                                           Export                                                 Export
                   Import                                               Import




            KAREN                                                              Internet
            AS38022
                                                    AS 12345

      Eg.
                                                                         Eg.
       Filter all RFC 1918 routes
       Import all AS38022 routes                                         No export AS38022 routes




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                          Proprietary and Confidential
                                                               Proprietary and Confidential   www.juniper.net
                                                                                               www.juniper.net   19
                                                                                                                 19
Platform requirements



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.      Proprietary and Confidential
                                           Proprietary and Confidential   www.juniper.net
                                                                           www.juniper.net   20
Router requirements
       BGP peers in the KAREN network will be expected to perform the following
             • BGP peering of both IPv4 and IPv6, large number of routes
             • While the Internet is currently 160K+ routes, KAREN “should” be smaller
             • Forwarding of Ethernet Jumbo Frames
             • Interdomain Multicast forwarding




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                 Proprietary and Confidential
                                                                      Proprietary and Confidential   www.juniper.net
                                                                                                      www.juniper.net   21
                                                                                                                        21
Router requirements
       Not all routers capable of the demands required
             • Does my platform of choice support all the relevant RFC’s?
             • Pay attention to maximum number of routes in Routing table and Forwarding Table
               for both IPv4 and IPv6
             • Is the router forwarding in Software or Hardware?
             • Do Jumbo Frames limit my forwarding performance, while mixed with smaller
               packets?
             • Is there a flexible “Policy” implementation to control routes installed in route
               table
             • What are the default Policies of BGP
             • Is there any additional Security I should be concerned about?




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                     Proprietary and Confidential
                                                                          Proprietary and Confidential   www.juniper.net
                                                                                                          www.juniper.net   22
More Information and
              Help?



Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.      Proprietary and Confidential
                                           Proprietary and Confidential   www.juniper.net
                                                                           www.juniper.net   23
More Information…
       Books


                                 Practical BGP        BGP Illustrated               JunOS Cookbook

                                 ISBN 0321127005      ISBN 0596002548              ISBN 0596100140




       RFC’s
             • Specifically RFC 1771, 1772 and 1997

       Online
             • http://www.bgp4.as
             • http://www.juniper.net/techpubs/software/junos/junos80/swconfig80-routing/frameset.htm



       Vendors, Consultants and your existing ISP




Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.                                          Proprietary and Confidential
                                                                               Proprietary and Confidential   www.juniper.net
                                                                                                               www.juniper.net   24
Q & A?


Copyright ©© 2006 Juniper Networks, Inc.
Copyright 2003 Juniper Networks, Inc.           Proprietary and Confidential
                                                Proprietary and Confidential   www.juniper.net
                                                                                www.juniper.net   25
Thank You

More Related Content

What's hot

CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)NetProtocol Xpert
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)NetProtocol Xpert
 
An intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolAn intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolIftach Ian Amit
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)Ann Joseph
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Nutan Singh
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 

What's hot (20)

CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
BGP
BGPBGP
BGP
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
An intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocolAn intoroduction to the IS-IS IGP routing protocol
An intoroduction to the IS-IS IGP routing protocol
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
 
BGP
BGP BGP
BGP
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Mpls
MplsMpls
Mpls
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
EIGRP Overview
EIGRP OverviewEIGRP Overview
EIGRP Overview
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 

Viewers also liked

Schneider Electric - Модульные DATA-центры
Schneider Electric - Модульные DATA-центрыSchneider Electric - Модульные DATA-центры
Schneider Electric - Модульные DATA-центрыExpolink
 
Linux firewall-201503
Linux firewall-201503Linux firewall-201503
Linux firewall-201503Kenduest Lee
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
MPLS + BGP Presentation
MPLS + BGP PresentationMPLS + BGP Presentation
MPLS + BGP PresentationGino McCarty
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
 
Operationalizing BGP in the SDDC
Operationalizing BGP in the SDDCOperationalizing BGP in the SDDC
Operationalizing BGP in the SDDCCumulus Networks
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
 

Viewers also liked (16)

Schneider Electric - Модульные DATA-центры
Schneider Electric - Модульные DATA-центрыSchneider Electric - Модульные DATA-центры
Schneider Electric - Модульные DATA-центры
 
New cvt ppt
New cvt pptNew cvt ppt
New cvt ppt
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
MPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label SwitchingMPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label Switching
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
Linux firewall-201503
Linux firewall-201503Linux firewall-201503
Linux firewall-201503
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
MPLS + BGP Presentation
MPLS + BGP PresentationMPLS + BGP Presentation
MPLS + BGP Presentation
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Operationalizing BGP in the SDDC
Operationalizing BGP in the SDDCOperationalizing BGP in the SDDC
Operationalizing BGP in the SDDC
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
 

Similar to BGP protocol presentation

Технологии построения крупных сетей
Технологии построения крупных сетейТехнологии построения крупных сетей
Технологии построения крупных сетейSkillFactory
 
Bgp 1232073634451868-3
Bgp 1232073634451868-3Bgp 1232073634451868-3
Bgp 1232073634451868-3afzel
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private networkhayenas
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
 
BGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveBGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveMiya Kohno
 
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PROIDEA
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5Irsandi Hasan
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
Routing to SDN Era
Routing to SDN Era Routing to SDN Era
Routing to SDN Era APNIC
 
IPv6 in 3G Core Networks
IPv6 in 3G Core NetworksIPv6 in 3G Core Networks
IPv6 in 3G Core NetworksJohn Loughney
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesJohn Berry
 
PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP
 PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP
PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGPPROIDEA
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bullsSwapnil Kapate
 
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PROIDEA
 

Similar to BGP protocol presentation (20)

Технологии построения крупных сетей
Технологии построения крупных сетейТехнологии построения крупных сетей
Технологии построения крупных сетей
 
eBGP.pptx
eBGP.pptxeBGP.pptx
eBGP.pptx
 
Bgp 1232073634451868-3
Bgp 1232073634451868-3Bgp 1232073634451868-3
Bgp 1232073634451868-3
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private network
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
 
BGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveBGP evolution -from SDN perspective
BGP evolution -from SDN perspective
 
CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06
 
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network
 
CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5CCNA Discovery 3 - Chapter 5
CCNA Discovery 3 - Chapter 5
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
Routing to SDN Era
Routing to SDN Era Routing to SDN Era
Routing to SDN Era
 
IPv6 in 3G Core Networks
IPv6 in 3G Core NetworksIPv6 in 3G Core Networks
IPv6 in 3G Core Networks
 
EIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS DifferencesEIGRP NXOS vs IOS Differences
EIGRP NXOS vs IOS Differences
 
PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP
 PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP
PLNOG22 - Piotr Wydrych - BGP w świecie SDN — SDN w świecie BGP
 
BGP
BGPBGP
BGP
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
Ipv6 routing
Ipv6 routingIpv6 routing
Ipv6 routing
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

BGP protocol presentation

  • 1. Border Gateway Protocol (BGP) KAREN Technical Workshop François Prowse fprowse@juniper.net Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1
  • 2. BGP Basics Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 2
  • 3. What is BGP?  BGP is the routing protocol used to advertise routes between institutions and the KAREN network  More than just a routing protocol, BGP routes contain many additional attributes  Controlled by flexible “Policy” rules that limit what routes we will learn and what we will advertise  BGP policy is traditionally used as an interpretation of commercial arrangements between carriers, ISP’s etc  BGP can be as simple or as complex as you wish Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 3
  • 4. What RFC’s define BGP?  RFC 1771 - A Border Gateway Protocol 4 (BGP-4)  RFC 1772 - Application of the Border Gateway Protocol in the Internet  RFC 1997 - BGP Communities Attribute  RFC 1965 - Autonomous System Confederations for BGP  RFC 1966 - BGP Route Reflection. An alternative to full mesh IBGP  RFC 2270 - Using a Dedicated AS for Sites Homed to a Single Provider  RFC 2283 - Multiprotocol Extensions for BGP-4  RFC 2385 - Protection of BGP Sessions via the TCP MD5 Signature Option  RFC 2439 - BGP Route Flap Damping  RFC 2545 - Multiprotocol Extensions for IPv6 Inter-Domain Routing Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4
  • 5. Routing Protocols  IGP – Interior Gateway protocol • Figures optimal path from one node to another node in a network • Examples include RIP, OSPF, ISIS etc… • Runs under a single technical/administrative control (AS) • Can support either IPv4 and/or IPv6  EGP – Exterior Gateway protocols • Allows different AS’s to exchange routing information to allow traffic across two different areas of control • Only one EGP used in the KAREN network -> BGP • Policy allows Peers to control routes leant between sites based on established agreements • Best practice is to only advertise the routes you wish people to actually reach. Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 5
  • 6. IGP – Interior Gateway protocol  Each AS maintains their own IGP  There is no interaction of IGP’s between any peers in the KAREN network  IGP’s are required to allow routing inside a domain  Examples include • Static routes • RIP • RIPng IPv6 capable • OSPF • OSPFv3 IPv6 capable • ISIS IPv6 capable • Other proprietary protocols  Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 6
  • 7. EGP – Exterior Gateway protocol  BGP Can be used in two scenarios • Internally, inside an Autonomous System • Known as IBGP (Internal BGP) • Peers share the same AS number • Typically implemented as a full mesh • Typically peer between loopback addresses • Externally, between peers • Known as EBGP (External BGP) • Peers have different AS numbers • Single point-to-point peering • Typically peer between interface addresses  All connections to the KAREN network use EBGP Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 7
  • 8. IBGP – Full mesh, on top of IGP KAREN Internet AS 12345 IBGP Peering Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 8
  • 9. EBGP, Peering to the Internet and KAREN KAREN Internet AS 12345 EBGP Peering Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 9
  • 10. IBGP and EBGP in operation KAREN Internet AS 12345 IBGP Peering EBGP Peering Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 10 10
  • 11. BGP Protocol Overview  BGP Runs over TCP  Any two routers that have formed a TCP connection to exchange BGP information are called “Peers” or ‘Neighbors”  Once connection is made, Peers exchange their full BGP routing tables.  Updates are then sent as the table changes or new routes are added to the network.  BGP peers in the KAREN network should be capable of exhanging both IPv4 and IPv6 routes Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 11 11
  • 12. BGP Routes  BGP routes contain more that just the advertised prefix • Origin • AS Path • Next Hop • Local Preference • Multiple Exit Discriminator • Community  BGP Policy looks at the prefix as well as route attributes for decision making  BGP attributes can often be changed to influence downstream policy Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 12 12
  • 13. Autonomous System  Autonomous System (AS) • Group of routers belonging to a single administrative domain • Viewed externally as a single, coherent interior routing domain • Each AS runs their own chosen IGP  AS Numbers • Public and private AS numbers are available for use • Public numbers assigned locally by APNIC to each institution • Larger tertiary institutions potentially already have one assigned  You will need a Publicly Assigned AS number to connect to KAREN! Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 13 13
  • 14. BGP Policy Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 14 14
  • 15. BGP Policy  BGP Policy controls what BGP routes are installed in the routers routing table and what routes are advertised to your peers  Use BGP policy when • You don’t want to import all learned routes into the routing table • You don’t want to advertise all known routes to neighboring routers • You want BGP to receive routes from another protocol (Redistribution) • You want to modify information (BGP Attributes) associated with routes  BGP Policy configuration varies with each router vendor and platform  BGP Policy can be as simple or as complex as you wish  Ensure your routers policy implementation is as flexible as possible Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 15 15
  • 16. Default Policy  BGP when left to its own devices will fall back to default policy for the import and export of routes.  Can vary with vendor implementation  Import • All routes learned from BGP neighbors are installed in the routing table  Export • Transmit all routes learned from BGP neighbors to all BGP neighbors • Advertise only active route  If you aren’t running IBGP in your network then you will need policy to redistribute IGP routes to KAREN Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 16 16
  • 17. Import and Export Policy  Control the flow of routes between your network and KAREN by creating specific policy rules!  Import Policy • Apply an import routing policy to control the routes that the routing protocol process uses to determine active routes • Affects routes that BGP receives from a neighbor • Modify BGP attributes  Export Policy • Apply an export routing policy to control the routes that a BGP router advertises to its neighbor • Modify BGP attributes Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 17 17
  • 18. Why do we need policy 200.0.0.0/24 192.168.0.0/24 KAREN Internet AS 12345 200.0.0.0/24 200.0.0.0/24 192.168.0.0/24 192.168.0.0/24 Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 18 18
  • 19. Policy enforcement Export Export Import Import KAREN Internet AS38022 AS 12345 Eg. Eg. Filter all RFC 1918 routes Import all AS38022 routes No export AS38022 routes Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 19 19
  • 20. Platform requirements Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 20
  • 21. Router requirements  BGP peers in the KAREN network will be expected to perform the following • BGP peering of both IPv4 and IPv6, large number of routes • While the Internet is currently 160K+ routes, KAREN “should” be smaller • Forwarding of Ethernet Jumbo Frames • Interdomain Multicast forwarding Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 21 21
  • 22. Router requirements  Not all routers capable of the demands required • Does my platform of choice support all the relevant RFC’s? • Pay attention to maximum number of routes in Routing table and Forwarding Table for both IPv4 and IPv6 • Is the router forwarding in Software or Hardware? • Do Jumbo Frames limit my forwarding performance, while mixed with smaller packets? • Is there a flexible “Policy” implementation to control routes installed in route table • What are the default Policies of BGP • Is there any additional Security I should be concerned about? Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 22
  • 23. More Information and Help? Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 23
  • 24. More Information…  Books Practical BGP BGP Illustrated JunOS Cookbook ISBN 0321127005 ISBN 0596002548 ISBN 0596100140  RFC’s • Specifically RFC 1771, 1772 and 1997  Online • http://www.bgp4.as • http://www.juniper.net/techpubs/software/junos/junos80/swconfig80-routing/frameset.htm  Vendors, Consultants and your existing ISP Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 24
  • 25. Q & A? Copyright ©© 2006 Juniper Networks, Inc. Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 25