Protecting Peering Relationships

The edge of the network, where two autonomous systems meet, is the most critical juncture in the BGP protocol. Here is where the network administrators of two different networks, managed by two different entities, with different goals, ideas, and concerns, must work together to provide security for both networks without compromising the network's utility or performance. The edge of the network is the place where most attacks are likely to be launched, and the BGP speaker on the edge is probably one of the most logical places to try and get into the network and impact the network's control plane.

There are several methods available to counter the threats of attacking the BGP speaker itself; we discuss traffic filters, ...

Get Practical BGP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.