SlideShare a Scribd company logo
MikroTik
BGP Security
By:	Roļ¬q	Fauzi	MUM	Kuala	Lumpur
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
2
About Rofiq Fauzi
CONSULTANT	
CERTIFIED	TRAINER	
h;p://www.mikroAk.com/consultants/asia/indonesia	
ā€¢ā€ÆUsing	MikroTik	(v.2.97)	since	2005,	as	Network	Engineer	at	WISP.	
ā€¢ā€Æ2007,	Network	&	Wireless	Engineer	at	INDOSAT	Central	Java	Area	
ā€¢ā€Æ2008,	IT	Network	&	Telco	Procurement	at		INDOSAT	HQ	
ā€¢ā€Æ2012-Now,	MikroTik	Consultant	&	CerAļ¬ed	Trainer	at	ID-Networkers	
(PT	Integrasi	Data	Nusantara).	
ā€¢ā€Æ2013-Now,	Network	Manager	at	WISP	Indomedianet,	Indonesia	
ā€¢ā€Æ2013-Now,	Network	ConsulAng	Engineer	at	Connexin	Limited,	Hull,	UK	
h;p://www.mikroAk.com/training/partners/asia/indonesia
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
3
About ID-Networkers
In	the	Most	PresAgious	Networking	CerAļ¬caAon	
EXPERT	LEVEL	TRAINERS		&		CONSULTANS	
OVERVIEW
We	 are	 young	 entrepreneurs,	 we	 are	 only	
one	 training	 partner	 &	 consultant	 who	 has	
expert	level	trainers	in	the	most	presAgious	
networking	 cerAļ¬caAon,	 CCIE	 Guru	 ,	 JNCIE	
Guru	 and	 MTCINE	 guru,	 which	 very	 limited	
number	in	Indonesia	even	Asia.	Proven	that	
hundred	 of	 our	 students	 pass	 the	
cerAļ¬caAon	 exam	 every	 year.	 We	 are	 the	
biggest	cerAļ¬caAon	factory	in	Indonesia.	
WEBSITE
www.idn.id	|	www.trainingmikroAk.com
OUR PROJECT IN MALAYSIA
Project Langkawi
Project	Wi-Fi	1Malaysia	in	all	
tourism	park	in	Langkawi	
Island	;	Cenang	Beach,	Pulau	
Tuba,	Pulau	Dayang	BunAng,	
Cable	Car,	etc.	
Integrated	Wi-Fi	network	
with	centralize	hotspot	user	
in	KL	area,	including	
apartment,	university,	
public	area,		etc.	
WiFi in KL
ID Networkers | www.trainingmikrotik.com
Expert Trainer and Consultant	
4
Project in Melaka
Wi-Fi	project	at	Sekolah	ALAM,	
Jabatan	Laut,	some	University	
and	Honda	Melaka,	etc.
About BGP
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
5
ā€¢ā€Æ Designed	as	Exterior	Gateway	Protocol	
ā€¢ā€Æ Internet	formed	by	BGP	rouAng	
ā€¢ā€Æ BGP	also	has	capability	to	carrying	informaAon	about	
diverse	routed	protocols	(ipv4,	ipv6,	l2vpn,	vpnv4)
BGP Multiprotocol Capabilities
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
6
Interior and Exterior Gateway Protocol
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
7
ā€¢ā€Æ Interior	Gateway	Protocol	(IGP)	
Handle	rouAng	within	an	Autonomous	System	(one	rouAng	
domain).	Can	be	said	that	the	IGP	is	a	rouAng	that	works	on	
our	proprietary	network,	or	all	routers	are	belong	to	us.	
ā€¢ā€Æ Exterior	Gateway	Protocol	(EGP)	
	 Handles	 the	 rouAng	 between	 Autonomous	 Systems	 (inter-
domain	 rouAng).	 Can	 be	 said	 that	 the	 EGP	 is	 working	 or	
rouAng	between	our	networks	with	not	our	networks.
AS1 AS2
Interior and Exterior Gateway Protocol
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
8
Interior	Gateway	Protocol:	OSPF,	IS-IS,	IGRP,	EIGRP,	RIP		
Exterior	Gateway	
Protocol:	BGP
Autonomous Systems (AS)
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
9
ā€¢ā€Æ AS	 is	 a	 combinaAon	 of	 networks	 and	 routers	 are	 usually	 in	 one	
ownership	or	control	that	has	a	similar	rouAng	protocol.	
ā€¢ā€Æ AS	16	bit,	or	use	decimal	(0	-	65535)	
ā€¢ā€Æ Range	1	-	64511	used	for	Internet	
ā€¢ā€Æ Range		64512	-		65535	used	for	private	
ā€¢ā€Æ With	 16-bit	 AS	 Numbers,	 only	 around	 65,000	 unique	 numbers	 are	
possible.		
ā€¢ā€Æ The	introducAon	of	32-bit	ASNs	increases	the	supply	of	AS	Numbers	
to	four	billion.	
ā€¢ā€Æ AS	Number	allocaAon	is	managed	by	IANA
BGP between AS in the Internet
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
10
h;ps://www.pasternack.com/t-calculator-fspl.aspx
BGP between AS in the Internet
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
11
h;p://bgp.he.net/
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
12
Full trust between peers is one of the
weaknesses of the protocol
IN BGP WE TRUST
AS100	give	wrong	informaAon		
to	AS200	
ID Networkers | www.trainingmikrotik.com
Expert Trainer and Consultant	
13
AS	200	give	the	right	informaAon		
but	coming	from	wrong	source		
Wrong	informaAon	will	spread	to	network	
LEAK	 X	X
The Internetā€™s Vulnerable Backbone
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
14
Types of BGP Attacks [workshop]
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
15
ā€¢ā€Æ Preļ¬x	Hijack	
ā€¢ā€Æ Denial	of	service	
ā€¢ā€Æ CreaAon	of	route	instabiliAes	(ļ¬‚apping)
Prefix Hijack
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
16
ā€¢ā€Æ Preļ¬x	hijacking,	a	misbehavior	in	which	a	misconļ¬gured	or	
malicious	 BGP	 router	 originates	 a	 route	 to	 an	 IP	 preļ¬x	 it	
does	not	own,		
ā€¢ā€Æ Its	is	becoming	an	increasingly	serious	security	problem	in	
the	Internet
How Attackers Can Hijack BGP
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
17
How Attackers Can Hijack BGP
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
18
Demo in GNS3
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
19
Topology
Demo
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
20
ā€¢ā€Æ Install	GNS3,	if	you	didnā€™t	know	how	to	install	mikroAk	on	GNS3,	follow	our	previous	
MUM	presentaAon	slide	at:	www.mikro@k.com/presentaAons/ID13/roļ¬q.pdf	
ā€¢ā€Æ Create	topology	(slide	15)	
ā€¢ā€Æ Conļ¬gure	BGP	peering	between	all	AS,	donā€™t	forget	for	AS	234	its	using	iBGP	peer	
(mesh	peering	or	router	refelctor)	
ā€¢ā€Æ Create	 loopback	 interface	 (bridge	 interface)	 in	 Router1	 and	 Router6,	 and	 put	 ip	
1.1.1.1/32	on	the	both	bridge	interfaces.	
ā€¢ā€Æ On	Router6,	in	rouAng	BGP	network,	adverAse	network	1.1.1.1/32	
ā€¢ā€Æ Check	in	Router1,	we	can	see	in	IP	route,	preļ¬x	1.1.1.1	with	as	path	234,600	thatā€™s	
mean	preļ¬x	1.1.1.1/32	originated	from	600	
ā€¢ā€Æ On	Router1,	in	rouAng	BGP	network	adverAse	network	1.1.1.1/32	too	
ā€¢ā€Æ Check	in	Router1,	we	can	see	in	IP	route,	preļ¬x	1.1.1.1	will	change	as	path	to	234,100
DOS Attack
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
21
Ref:	h;p://www.133tsec.com/2012/04/30/0day-ddos-mikroAk-server-side-ddos-a;ack/	
ā€¢ā€Æ One	 of	 the	 denial	 of	 service	 (DDOS),	 happens	 on	 mikroAk	 routerā€™s	 winbox	
service	when	the	a;acker	is	requesAng	conAnuously	a	part	of	a	.dll/plugin	ļ¬le	
ā€¢ā€Æ It	raises	routerā€™s	CPU	100%	and	other	acAons.	The	ā€œother	acAonsā€	depends	on	
the	routeros	version	and	the	hardware.	
ā€¢ā€Æ For	 example	 on	 MikroAk	 Router	 v3.30	 there	 was	 a	 LAN	 corrupAon,	 BGP	 fail,	
whole	router	failure	
ā€¢ā€Æ MikroAk	Router	v2.9.6	there	was	a	BGP	failure	
ā€¢ā€Æ MikroAk	Router	v4.13	unstable	wiļ¬	links	
ā€¢ā€Æ MikroAk	Router	v5.14/5.15	rarely	stacking	
ā€¢ā€Æ Behaviour	 may	 vary	 most	 Ames,	 but	 ALL	 will	 have	 CPU	 Usage	 100%	 .	 Most	
routers	loose	BGP	aper	long	Ame	a;ack
Demo DOS Attack
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
22
ā€¢ā€Æ Download	tesAng	script	from		
h;p://www.133tsec.com/wp-content/uploads/2012/04/mkDl.zip	
ā€¢ā€Æ Extract	it	in	your	C	folder	
ā€¢ā€Æ Run	in	your	windows	command	prompt	
C:>	mkDl.py	<RouterIPAddress>	DoS	
[Winbox	plugin	downloader]	
[+]	Hmmm	we	gonna	attack	it..	
[+]	Index	received!	
[+]	Requesting	file		roteros.dll		till	death	:)	
Sending	evil	packet..	press	CTRL-C	to	stop	ā€“	
-ā€Æ Watch	your	router	CPU	usage	
Warning!	This	content	and	tool	are	for	educaAon	proposed	only,	I	am	not	responsible	for	anything	that	might	
happen	to	you	or	your	routers	if	you	use	it	to	DDOS	your	router,	and	or	causing	any	damage	or	error.
Defend BGP Attacks
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
23
ā€¢ā€Æ Always	Update	your	RouterOS	
ā€¢ā€Æ Good	BGP	Router	Conļ¬guraAon	
ā€¢ā€Æ Detect	False	Route	Announcements	
ā€¢ā€Æ RPKI
Good Router Configuration
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
24
Use	rouAng	ļ¬lter	to	control	preļ¬x	exchange	between	BGP	peering	
In	Filters	
ā€¢ā€Æ Donā€™t	accept	your	own	preļ¬xes	
ā€¢ā€Æ Donā€™t	accept	RFC	1918	(private	IP	address)	and	other	reserved	ones	(RFC	5735)	
ā€¢ā€Æ Donā€™t	accept	default	route	(unless	you	need	it)	
ā€¢ā€Æ Donā€™t	accept	preļ¬xes	longer	than	/24	
ā€¢ā€Æ Donā€™t	accept	BOGONS	preļ¬xes	
ā€¢ā€Æ Limit	your	Max	Preļ¬x	
ā€¢ā€Æ Limit	AS_	Path	
Out	Filters	
ā€¢ā€Æ Announce	only	owned	preļ¬xes	(in	case	you	do	not	provide	transit	to	other	ASā€™s)	
Credit	to	Wardner	Maia,	ref:	h;p://mdbrasil.com.br/en/downloads/1_Maia.pdf
Detect False Route Announcements
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
25
h;ps://stat.ripe.net/widget/bgplay
BGP Routing Table Size
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
26
CounAng	
Source	=	h;p://www.cidr-report.org/
Detect Route Flapping
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
27
Detect	RouAng	table	size:	
	
/system	scheduler	
add	interval=5m	name=schedule1	on-event=detect-route	start-
time=startup	
	
/system	script	
add	name	=detect-route	
source=ā€œ:local	routeSize	[/ip	route	print	count-only];	
:if	($routeSize	>	5400000)	do={/log	error	"	Your	routing	table	
is	$routeSize	,	Routing	table	abnormal"}	else={/log	warning	"	
Your	routing	table	size	is	$routeSize	,	normal!"}ā€
Detect Route Flapping
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
28
Limit Prefix Number
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
29
If	our	in	ļ¬lter	receive	all	internet	preļ¬x	from	our	peering,	we	should	
limit	the	number	of	preļ¬x	by	following	command:	
	
[admin@BGP-ROUTER]	>	routing	bgp	peer	set	number=0	max-prefix-limit=600000
MikroTik Routing Filter
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
30
ā€¢ā€Æh;p://wiki.mikroAk.com/wiki/Manual:RouAng/RouAng_ļ¬lters	
ā€¢ā€ÆEasy	 way	 to	 manage	 and	 ļ¬lter	 receiving	 and	
propagaAng	preļ¬x	in	MikroTik	RouterOS.	
ā€¢ā€ÆEasy	way	to	set	any	rouAng	parameters	
ā€¢ā€ÆUsing	ip	ļ¬rewall	ļ¬lter	algorithm	(if-then	condiAon)	
ā€¢ā€ÆCan	be	assign	in	BGP	instance	(out-ļ¬lter	only)	and	BGP	
peering	(in	and	out	ļ¬lter)
MikroTik Routing Filter
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
31
Invalid BGP Route
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
32
From	the	636871	preļ¬xes	that	are	currently	in	the	rouAng	table,	40445	match	at	least	one	ROA.	From	
these	matched	preļ¬xes	3678	are	invalid	while	36767	are	valid.	The	line	chart	below	shows	the	valid	
and	invalid	routes	over	the	course	of	Ame.	
h;p://rpki.surfnet.nl/trends.html
RPKI (Resource Public Key Infrastructure)
ID Networkers | www.trainingmikrotik.com
Expert	Trainer	and	Consultant	
33
ā€¢ā€Æ h;p://en.wikipedia.org/wiki/Resource_Public_Key_Infrastructure	
ā€¢ā€Æ RPKI	is	a	ļ¬rst	step	to	secure	BGP	
ā€¢ā€Æ It	 allows	 to	 cerAfy	 (and	 verify)	 that	 a	 preļ¬x	 is	
adverAsed	by	original	AS	(in	other	words	that	an	IP	
points	to	its	legiAmate	owner)		
ā€¢ā€Æ Not	yet	support	by	MikroTik	RouterOS	6	
ā€¢ā€Æ Will	be	included	in	RouterOS	V7	???
ā€œIf	you	cannot	survive	in	the	Ared	of	learning,	then	you	will	be	suļ¬€ering	by	the	pain	of	stupidityā€	(Imam	Syaļ¬ā€™i)	
	
THANK YOU
FOR YOUR TIME
ID Networkers | www.trainingmikrotik.com
Expert Trainer and Consultant	
34
If	you	have	any	other	quesAons	or	would	like	me	to	
clarify	anything	else,	please,	let	me	know.	I	am	always	
glad	to	help	in	any	way	I	can	
Jakarta	&	Semarang,	Indonesia	
www.trainingmikroAk.com	
rroļ¬q@idn.id	
	+62	8156583545	
@mymikroAk	
www.facebook.com/ropix	
	
ADDRESS:	
WEBSITE:	
EMAIL:	
TELEPHONE:	
id.linkedin.com/in/ropix/	
roļ¬q.fauzi	
CONTACT

More Related Content

What's hot

MikroTik Internet Route Filter
MikroTik Internet Route FilterMikroTik Internet Route Filter
MikroTik Internet Route Filter
Teav Sovandara
Ā 
Mikro tik advanced training
Mikro tik advanced trainingMikro tik advanced training
Mikro tik advanced trainingJignesh H. Bhalsod
Ā 
Workshop IPv6 APJII Jawa Barat
Workshop IPv6 APJII Jawa Barat Workshop IPv6 APJII Jawa Barat
Workshop IPv6 APJII Jawa Barat
Faisal Reza
Ā 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Rofiq Fauzi
Ā 
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar AzwirMikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
Ā 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
Rofiq Fauzi
Ā 
MTCNA
MTCNAMTCNA
MUM Laos 2017 - Choosing Mikrotik for Your Network
MUM Laos 2017 - Choosing Mikrotik for Your NetworkMUM Laos 2017 - Choosing Mikrotik for Your Network
MUM Laos 2017 - Choosing Mikrotik for Your Network
Faisal Reza
Ā 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
KHNOG
Ā 
Wireless Project Using CAPsMAN
Wireless Project Using CAPsMANWireless Project Using CAPsMAN
Wireless Project Using CAPsMANAidan Venn MSc
Ā 
MikroTik Multicast Routing [www.imxpert.co]
MikroTik Multicast Routing [www.imxpert.co]MikroTik Multicast Routing [www.imxpert.co]
MikroTik Multicast Routing [www.imxpert.co]
Faisal Reza
Ā 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
KHNOG
Ā 
Wireless Developing Wireless Monitoring and Control devices
Wireless Developing Wireless Monitoring and Control devicesWireless Developing Wireless Monitoring and Control devices
Wireless Developing Wireless Monitoring and Control devicesAidan Venn MSc
Ā 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
Faelix Ltd
Ā 
Running BGP with Mikrotik
Running BGP with MikrotikRunning BGP with Mikrotik
Running BGP with Mikrotik
GLC Networks
Ā 
MikrotikĀ® MPLS/VPN Lab Part 1
MikrotikĀ® MPLS/VPN Lab Part 1MikrotikĀ® MPLS/VPN Lab Part 1
MikrotikĀ® MPLS/VPN Lab Part 1
Kaveh Khosravi
Ā 
BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
Achmad Mardiansyah
Ā 
Choosing MikroTik for Your Network
Choosing MikroTik for Your NetworkChoosing MikroTik for Your Network
Choosing MikroTik for Your Network
Faisal Reza
Ā 
VXLAN and FRRouting
VXLAN and FRRoutingVXLAN and FRRouting
VXLAN and FRRouting
Faisal Reza
Ā 

What's hot (20)

MikroTik Internet Route Filter
MikroTik Internet Route FilterMikroTik Internet Route Filter
MikroTik Internet Route Filter
Ā 
Mikro tik advanced training
Mikro tik advanced trainingMikro tik advanced training
Mikro tik advanced training
Ā 
Workshop IPv6 APJII Jawa Barat
Workshop IPv6 APJII Jawa Barat Workshop IPv6 APJII Jawa Barat
Workshop IPv6 APJII Jawa Barat
Ā 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
Ā 
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar AzwirMikrotik RouterOS Security Audit Checklist by Akbar Azwir
Mikrotik RouterOS Security Audit Checklist by Akbar Azwir
Ā 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
Ā 
MTCNA
MTCNAMTCNA
MTCNA
Ā 
MUM Laos 2017 - Choosing Mikrotik for Your Network
MUM Laos 2017 - Choosing Mikrotik for Your NetworkMUM Laos 2017 - Choosing Mikrotik for Your Network
MUM Laos 2017 - Choosing Mikrotik for Your Network
Ā 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
Ā 
Wireless Project Using CAPsMAN
Wireless Project Using CAPsMANWireless Project Using CAPsMAN
Wireless Project Using CAPsMAN
Ā 
MikroTik Multicast Routing [www.imxpert.co]
MikroTik Multicast Routing [www.imxpert.co]MikroTik Multicast Routing [www.imxpert.co]
MikroTik Multicast Routing [www.imxpert.co]
Ā 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
Ā 
Wireless Developing Wireless Monitoring and Control devices
Wireless Developing Wireless Monitoring and Control devicesWireless Developing Wireless Monitoring and Control devices
Wireless Developing Wireless Monitoring and Control devices
Ā 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
Ā 
Running BGP with Mikrotik
Running BGP with MikrotikRunning BGP with Mikrotik
Running BGP with Mikrotik
Ā 
MikrotikĀ® MPLS/VPN Lab Part 1
MikrotikĀ® MPLS/VPN Lab Part 1MikrotikĀ® MPLS/VPN Lab Part 1
MikrotikĀ® MPLS/VPN Lab Part 1
Ā 
BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
Ā 
Choosing MikroTik for Your Network
Choosing MikroTik for Your NetworkChoosing MikroTik for Your Network
Choosing MikroTik for Your Network
Ā 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
Ā 
VXLAN and FRRouting
VXLAN and FRRoutingVXLAN and FRRouting
VXLAN and FRRouting
Ā 

Viewers also liked

Scaling BGP
Scaling BGPScaling BGP
Scaling BGP
APNIC
Ā 
Presentation DHCP Server
Presentation DHCP ServerPresentation DHCP Server
Presentation DHCP Server
Andry Ansah
Ā 
Presentation Analisis Kebutuhan Software Windows Server 2003
Presentation Analisis Kebutuhan Software Windows Server 2003Presentation Analisis Kebutuhan Software Windows Server 2003
Presentation Analisis Kebutuhan Software Windows Server 2003
Andry Ansah
Ā 
Presentation Installasi,Configuration,Troubleshot IIS Web Server
Presentation Installasi,Configuration,Troubleshot IIS Web ServerPresentation Installasi,Configuration,Troubleshot IIS Web Server
Presentation Installasi,Configuration,Troubleshot IIS Web Server
Andry Ansah
Ā 
CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
Dobri Boyadzhiev
Ā 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
Andry Ansah
Ā 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
Ali Layth
Ā 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
Ā 

Viewers also liked (8)

Scaling BGP
Scaling BGPScaling BGP
Scaling BGP
Ā 
Presentation DHCP Server
Presentation DHCP ServerPresentation DHCP Server
Presentation DHCP Server
Ā 
Presentation Analisis Kebutuhan Software Windows Server 2003
Presentation Analisis Kebutuhan Software Windows Server 2003Presentation Analisis Kebutuhan Software Windows Server 2003
Presentation Analisis Kebutuhan Software Windows Server 2003
Ā 
Presentation Installasi,Configuration,Troubleshot IIS Web Server
Presentation Installasi,Configuration,Troubleshot IIS Web ServerPresentation Installasi,Configuration,Troubleshot IIS Web Server
Presentation Installasi,Configuration,Troubleshot IIS Web Server
Ā 
CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
Ā 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
Ā 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
Ā 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Ā 

Similar to BGP Security (Mum presentation 2016)

Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]
Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]
Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]Mahadiputra S
Ā 
manthan_resume
manthan_resumemanthan_resume
manthan_resumemanthan patel
Ā 
Salman Mahmood Resume
Salman Mahmood ResumeSalman Mahmood Resume
Salman Mahmood Resumesalman321
Ā 
Umair Sefat
Umair SefatUmair Sefat
Umair Sefatumair sefat
Ā 
Ccna security
Ccna security Ccna security
Ccna security
umesh patil
Ā 
Ccna security
Ccna security Ccna security
Ccna security
sanjay joshi
Ā 
S.manjunath profile
S.manjunath profile S.manjunath profile
S.manjunath profile
Manjunath S
Ā 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
Amir Jafari
Ā 
parkash kr latest (1)
parkash kr latest (1)parkash kr latest (1)
parkash kr latest (1)parkash kumar
Ā 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
Ā 
Musarrat Resume
Musarrat ResumeMusarrat Resume
Musarrat ResumeMusarrat Khan
Ā 
Naveed Iqbal CCIE 44475
Naveed Iqbal CCIE 44475Naveed Iqbal CCIE 44475
Naveed Iqbal CCIE 44475Naveed Iqbal
Ā 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CVNagaraj B
Ā 

Similar to BGP Security (Mum presentation 2016) (20)

Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]
Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]
Mikrotik Network Simulator (MUM Presentation Material 2013) [COPY]
Ā 
Chandramohan Rajagopal V3
Chandramohan Rajagopal V3Chandramohan Rajagopal V3
Chandramohan Rajagopal V3
Ā 
manthan_resume
manthan_resumemanthan_resume
manthan_resume
Ā 
Surojit_CV (1)
Surojit_CV (1)Surojit_CV (1)
Surojit_CV (1)
Ā 
Salman Mahmood Resume
Salman Mahmood ResumeSalman Mahmood Resume
Salman Mahmood Resume
Ā 
Umair Sefat
Umair SefatUmair Sefat
Umair Sefat
Ā 
KIRAN UPDATED CV
KIRAN UPDATED CVKIRAN UPDATED CV
KIRAN UPDATED CV
Ā 
Amit's CV
Amit's CVAmit's CV
Amit's CV
Ā 
Ccna security
Ccna security Ccna security
Ccna security
Ā 
Ccna security
Ccna security Ccna security
Ccna security
Ā 
S.manjunath profile
S.manjunath profile S.manjunath profile
S.manjunath profile
Ā 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
Ā 
Ijalesh_CV
Ijalesh_CVIjalesh_CV
Ijalesh_CV
Ā 
parkash kr latest (1)
parkash kr latest (1)parkash kr latest (1)
parkash kr latest (1)
Ā 
Ccna security
Ccna securityCcna security
Ccna security
Ā 
CV_KAhmed
CV_KAhmedCV_KAhmed
CV_KAhmed
Ā 
Musarrat Resume
Musarrat ResumeMusarrat Resume
Musarrat Resume
Ā 
Anil-CV
Anil-CVAnil-CV
Anil-CV
Ā 
Naveed Iqbal CCIE 44475
Naveed Iqbal CCIE 44475Naveed Iqbal CCIE 44475
Naveed Iqbal CCIE 44475
Ā 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CV
Ā 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 

BGP Security (Mum presentation 2016)

  • 2. ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 2 About Rofiq Fauzi CONSULTANT CERTIFIED TRAINER h;p://www.mikroAk.com/consultants/asia/indonesia ā€¢ā€ÆUsing MikroTik (v.2.97) since 2005, as Network Engineer at WISP. ā€¢ā€Æ2007, Network & Wireless Engineer at INDOSAT Central Java Area ā€¢ā€Æ2008, IT Network & Telco Procurement at INDOSAT HQ ā€¢ā€Æ2012-Now, MikroTik Consultant & CerAļ¬ed Trainer at ID-Networkers (PT Integrasi Data Nusantara). ā€¢ā€Æ2013-Now, Network Manager at WISP Indomedianet, Indonesia ā€¢ā€Æ2013-Now, Network ConsulAng Engineer at Connexin Limited, Hull, UK h;p://www.mikroAk.com/training/partners/asia/indonesia
  • 3. ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 3 About ID-Networkers In the Most PresAgious Networking CerAļ¬caAon EXPERT LEVEL TRAINERS & CONSULTANS OVERVIEW We are young entrepreneurs, we are only one training partner & consultant who has expert level trainers in the most presAgious networking cerAļ¬caAon, CCIE Guru , JNCIE Guru and MTCINE guru, which very limited number in Indonesia even Asia. Proven that hundred of our students pass the cerAļ¬caAon exam every year. We are the biggest cerAļ¬caAon factory in Indonesia. WEBSITE www.idn.id | www.trainingmikroAk.com
  • 4. OUR PROJECT IN MALAYSIA Project Langkawi Project Wi-Fi 1Malaysia in all tourism park in Langkawi Island ; Cenang Beach, Pulau Tuba, Pulau Dayang BunAng, Cable Car, etc. Integrated Wi-Fi network with centralize hotspot user in KL area, including apartment, university, public area, etc. WiFi in KL ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 4 Project in Melaka Wi-Fi project at Sekolah ALAM, Jabatan Laut, some University and Honda Melaka, etc.
  • 5. About BGP ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 5 ā€¢ā€Æ Designed as Exterior Gateway Protocol ā€¢ā€Æ Internet formed by BGP rouAng ā€¢ā€Æ BGP also has capability to carrying informaAon about diverse routed protocols (ipv4, ipv6, l2vpn, vpnv4)
  • 6. BGP Multiprotocol Capabilities ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 6
  • 7. Interior and Exterior Gateway Protocol ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 7 ā€¢ā€Æ Interior Gateway Protocol (IGP) Handle rouAng within an Autonomous System (one rouAng domain). Can be said that the IGP is a rouAng that works on our proprietary network, or all routers are belong to us. ā€¢ā€Æ Exterior Gateway Protocol (EGP) Handles the rouAng between Autonomous Systems (inter- domain rouAng). Can be said that the EGP is working or rouAng between our networks with not our networks.
  • 8. AS1 AS2 Interior and Exterior Gateway Protocol ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 8 Interior Gateway Protocol: OSPF, IS-IS, IGRP, EIGRP, RIP Exterior Gateway Protocol: BGP
  • 9. Autonomous Systems (AS) ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 9 ā€¢ā€Æ AS is a combinaAon of networks and routers are usually in one ownership or control that has a similar rouAng protocol. ā€¢ā€Æ AS 16 bit, or use decimal (0 - 65535) ā€¢ā€Æ Range 1 - 64511 used for Internet ā€¢ā€Æ Range 64512 - 65535 used for private ā€¢ā€Æ With 16-bit AS Numbers, only around 65,000 unique numbers are possible. ā€¢ā€Æ The introducAon of 32-bit ASNs increases the supply of AS Numbers to four billion. ā€¢ā€Æ AS Number allocaAon is managed by IANA
  • 10. BGP between AS in the Internet ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 10 h;ps://www.pasternack.com/t-calculator-fspl.aspx
  • 11. BGP between AS in the Internet ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 11 h;p://bgp.he.net/
  • 12. ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 12 Full trust between peers is one of the weaknesses of the protocol
  • 13. IN BGP WE TRUST AS100 give wrong informaAon to AS200 ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 13 AS 200 give the right informaAon but coming from wrong source Wrong informaAon will spread to network LEAK X X
  • 14. The Internetā€™s Vulnerable Backbone ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 14
  • 15. Types of BGP Attacks [workshop] ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 15 ā€¢ā€Æ Preļ¬x Hijack ā€¢ā€Æ Denial of service ā€¢ā€Æ CreaAon of route instabiliAes (ļ¬‚apping)
  • 16. Prefix Hijack ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 16 ā€¢ā€Æ Preļ¬x hijacking, a misbehavior in which a misconļ¬gured or malicious BGP router originates a route to an IP preļ¬x it does not own, ā€¢ā€Æ Its is becoming an increasingly serious security problem in the Internet
  • 17. How Attackers Can Hijack BGP ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 17
  • 18. How Attackers Can Hijack BGP ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 18
  • 19. Demo in GNS3 ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 19 Topology
  • 20. Demo ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 20 ā€¢ā€Æ Install GNS3, if you didnā€™t know how to install mikroAk on GNS3, follow our previous MUM presentaAon slide at: www.mikro@k.com/presentaAons/ID13/roļ¬q.pdf ā€¢ā€Æ Create topology (slide 15) ā€¢ā€Æ Conļ¬gure BGP peering between all AS, donā€™t forget for AS 234 its using iBGP peer (mesh peering or router refelctor) ā€¢ā€Æ Create loopback interface (bridge interface) in Router1 and Router6, and put ip 1.1.1.1/32 on the both bridge interfaces. ā€¢ā€Æ On Router6, in rouAng BGP network, adverAse network 1.1.1.1/32 ā€¢ā€Æ Check in Router1, we can see in IP route, preļ¬x 1.1.1.1 with as path 234,600 thatā€™s mean preļ¬x 1.1.1.1/32 originated from 600 ā€¢ā€Æ On Router1, in rouAng BGP network adverAse network 1.1.1.1/32 too ā€¢ā€Æ Check in Router1, we can see in IP route, preļ¬x 1.1.1.1 will change as path to 234,100
  • 21. DOS Attack ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 21 Ref: h;p://www.133tsec.com/2012/04/30/0day-ddos-mikroAk-server-side-ddos-a;ack/ ā€¢ā€Æ One of the denial of service (DDOS), happens on mikroAk routerā€™s winbox service when the a;acker is requesAng conAnuously a part of a .dll/plugin ļ¬le ā€¢ā€Æ It raises routerā€™s CPU 100% and other acAons. The ā€œother acAonsā€ depends on the routeros version and the hardware. ā€¢ā€Æ For example on MikroAk Router v3.30 there was a LAN corrupAon, BGP fail, whole router failure ā€¢ā€Æ MikroAk Router v2.9.6 there was a BGP failure ā€¢ā€Æ MikroAk Router v4.13 unstable wiļ¬ links ā€¢ā€Æ MikroAk Router v5.14/5.15 rarely stacking ā€¢ā€Æ Behaviour may vary most Ames, but ALL will have CPU Usage 100% . Most routers loose BGP aper long Ame a;ack
  • 22. Demo DOS Attack ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 22 ā€¢ā€Æ Download tesAng script from h;p://www.133tsec.com/wp-content/uploads/2012/04/mkDl.zip ā€¢ā€Æ Extract it in your C folder ā€¢ā€Æ Run in your windows command prompt C:> mkDl.py <RouterIPAddress> DoS [Winbox plugin downloader] [+] Hmmm we gonna attack it.. [+] Index received! [+] Requesting file roteros.dll till death :) Sending evil packet.. press CTRL-C to stop ā€“ -ā€Æ Watch your router CPU usage Warning! This content and tool are for educaAon proposed only, I am not responsible for anything that might happen to you or your routers if you use it to DDOS your router, and or causing any damage or error.
  • 23. Defend BGP Attacks ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 23 ā€¢ā€Æ Always Update your RouterOS ā€¢ā€Æ Good BGP Router Conļ¬guraAon ā€¢ā€Æ Detect False Route Announcements ā€¢ā€Æ RPKI
  • 24. Good Router Configuration ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 24 Use rouAng ļ¬lter to control preļ¬x exchange between BGP peering In Filters ā€¢ā€Æ Donā€™t accept your own preļ¬xes ā€¢ā€Æ Donā€™t accept RFC 1918 (private IP address) and other reserved ones (RFC 5735) ā€¢ā€Æ Donā€™t accept default route (unless you need it) ā€¢ā€Æ Donā€™t accept preļ¬xes longer than /24 ā€¢ā€Æ Donā€™t accept BOGONS preļ¬xes ā€¢ā€Æ Limit your Max Preļ¬x ā€¢ā€Æ Limit AS_ Path Out Filters ā€¢ā€Æ Announce only owned preļ¬xes (in case you do not provide transit to other ASā€™s) Credit to Wardner Maia, ref: h;p://mdbrasil.com.br/en/downloads/1_Maia.pdf
  • 25. Detect False Route Announcements ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 25 h;ps://stat.ripe.net/widget/bgplay
  • 26. BGP Routing Table Size ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 26 CounAng Source = h;p://www.cidr-report.org/
  • 27. Detect Route Flapping ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 27 Detect RouAng table size: /system scheduler add interval=5m name=schedule1 on-event=detect-route start- time=startup /system script add name =detect-route source=ā€œ:local routeSize [/ip route print count-only]; :if ($routeSize > 5400000) do={/log error " Your routing table is $routeSize , Routing table abnormal"} else={/log warning " Your routing table size is $routeSize , normal!"}ā€
  • 28. Detect Route Flapping ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 28
  • 29. Limit Prefix Number ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 29 If our in ļ¬lter receive all internet preļ¬x from our peering, we should limit the number of preļ¬x by following command: [admin@BGP-ROUTER] > routing bgp peer set number=0 max-prefix-limit=600000
  • 30. MikroTik Routing Filter ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 30 ā€¢ā€Æh;p://wiki.mikroAk.com/wiki/Manual:RouAng/RouAng_ļ¬lters ā€¢ā€ÆEasy way to manage and ļ¬lter receiving and propagaAng preļ¬x in MikroTik RouterOS. ā€¢ā€ÆEasy way to set any rouAng parameters ā€¢ā€ÆUsing ip ļ¬rewall ļ¬lter algorithm (if-then condiAon) ā€¢ā€ÆCan be assign in BGP instance (out-ļ¬lter only) and BGP peering (in and out ļ¬lter)
  • 31. MikroTik Routing Filter ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 31
  • 32. Invalid BGP Route ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 32 From the 636871 preļ¬xes that are currently in the rouAng table, 40445 match at least one ROA. From these matched preļ¬xes 3678 are invalid while 36767 are valid. The line chart below shows the valid and invalid routes over the course of Ame. h;p://rpki.surfnet.nl/trends.html
  • 33. RPKI (Resource Public Key Infrastructure) ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 33 ā€¢ā€Æ h;p://en.wikipedia.org/wiki/Resource_Public_Key_Infrastructure ā€¢ā€Æ RPKI is a ļ¬rst step to secure BGP ā€¢ā€Æ It allows to cerAfy (and verify) that a preļ¬x is adverAsed by original AS (in other words that an IP points to its legiAmate owner) ā€¢ā€Æ Not yet support by MikroTik RouterOS 6 ā€¢ā€Æ Will be included in RouterOS V7 ???
  • 34. ā€œIf you cannot survive in the Ared of learning, then you will be suļ¬€ering by the pain of stupidityā€ (Imam Syaļ¬ā€™i) THANK YOU FOR YOUR TIME ID Networkers | www.trainingmikrotik.com Expert Trainer and Consultant 34 If you have any other quesAons or would like me to clarify anything else, please, let me know. I am always glad to help in any way I can Jakarta & Semarang, Indonesia www.trainingmikroAk.com rroļ¬q@idn.id +62 8156583545 @mymikroAk www.facebook.com/ropix ADDRESS: WEBSITE: EMAIL: TELEPHONE: id.linkedin.com/in/ropix/ roļ¬q.fauzi CONTACT