- Why do we keep seeing news headlines about major networks not being reachable because traffic got rerouted to somewhere else? BGP mishaps are very common and frighteningly very easy. Examples are malicious route hijacking, mis-origination (fat fingers), and bad filters (route leaks). We need better mechanism to ensure no one can inject false information into the global routing system that easily.
- This workshop will look at current tools/techniques, how rPKI is just a piece in the puzzle, and what we should to secure the internet routing instead of waiting for an ideal solution that fixes all issues.
This workshop will be held at PacNOG 24, please visit the event website for full details and to register – https://pacnog.org/pacnog24/
Technical staff who are now building or operating a service provider network with international and/or multi-provider connectivity, or considering participation at an Internet Exchange point.
- It is assumed that the workshop participants have a working knowledge of an OSPF/IS-IS and BGP fundamentals, along with know how to use a router command line interface.
- This workshop is not an introduction. The lab exercises use Cisco IOS configuration syntax.
- Internet Routing Basics (recap)
- Address Planning (IPv6) and traffic engineering
- BGP Fundamentals (recap)
- BGP Scaling techniques
- BGP Attributes and Policy Control
- Internet Multihoming Techniques
- BGP Operations and Security best practices
- BGP Filtering techniques
- Resource PKI fundamentals
- BGP Filtering with ROA (Route Origin Validation)
- BGP AS-path validation
Maximum number of attendees