Protecting Peering Relationships

The edge of the network, where two autonomous systems meet, is the most critical juncture in the BGP protocol. Here is where the network administrators of two different networks, managed by two different entities, with different goals, ideas, and concerns, must work together to provide security for both networks without compromising the network's utility or performance. The edge of the network is the place where most attacks are likely to be launched, and the BGP speaker on the edge is probably one of the most logical places to try and get into the network and impact the network's control plane.

There are several methods available to counter the threats of attacking the BGP speaker itself; we discuss traffic filters, ...

Get Practical BGP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.