Blog

Blog

In our last post, we took a look at RPKI. With RPKI, it's possible to reject prefixes that are originated by the wrong AS,...

The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...

BGP security

In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...

MD5 password

Back in the late 1980s and the early 1990s when BGP was developed, security was still an afterthought for protocols used on the internet....

Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are “more specific” prefixes—subsets...

Peering policy

As discussed in earlier posts, as networks grow larger it starts making sense to exchange traffic with other networks directly (peering) rather than pay...

IPv4 BGP vs IPv6 BGP

BGP is older than IPv6. Even BGP-4, the version we still use today, predates IPv6: the first BGP-4 RFC (RFC 1654) was published in...

packet loss

As explained in our last blog post, packet loss and latency can seriously impact application performance. There's not much we can do about latency,...

packet loss

The triumvirate of network performance metrics are latency, loss and jitter. Today, we're going to take a look at how each of them —...

network downtime

Business people often believe that in order to have a reliable system, you need reliable components. Using reliable components to build your network certainly...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL