Why do we keep seeing news headlines about major networks not being reachable because traffic got rerouted to somewhere else? BGP mishaps are very common and frighteningly very easy.
Examples are malicious route hijacking, mis-origination (fat fingers), and bad filters (route leaks). We need better mechanism to ensure no one can inject false information into the global routing system that easily.
This workshop will look at current tools/techniques, and what we should to secure the internet routing instead of waiting for an ideal solution that fixes all issues
This online tutorial is fee-free.
Technical staff who are now building or operating a service provider network with international and/or multi-provider connectivity, or considering participation at an Internet Exchange point.
It is assumed that the workshop participants have a working knowledge of an OSPF/IS-IS and BGP fundamentals, along with know how to use a router command line interface.
We recommend the following Academy courses be completed before the start of the tutorial:
Routing Basics: https://academy.apnic.net/en/course/routing-basics/
Lab exercise: APNIC Academy Deploying BGP (cisco)
- BGP Traffic Engineering
- BGP Multi Homing
- BGP Communities
Hardware: Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
Software: SSH Client, Telnet Client, VirtualBox/VMware
Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure? Test ssh connectivity, try to connect to route-views.oregon-ix.net. For example from the CLI type: ssh firstname.lastname@example.org