Blog

Blog

Video is an interesting network application. Many users consume hours of video per day, and an hour of HD video is easily more than...

When flying, it's important to choose the right airline. Obviously, a direct connection is usually best, but if a layover is necessary, it helps...

The network that never needs any maintenance, along with the associated downtime, hasn't been built yet. You can plan your own downtime such that...

In our last post, we took a look at RPKI. With RPKI, it's possible to reject prefixes that are originated by the wrong AS,...

The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...

BGP security

In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...

MD5 password

Back in the late 1980s and the early 1990s when BGP was developed, security was still an afterthought for protocols used on the internet....

Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are “more specific” prefixes—subsets...

Peering policy

As discussed in earlier posts, as networks grow larger it starts making sense to exchange traffic with other networks directly (peering) rather than pay...

IPv4 BGP vs IPv6 BGP

BGP is older than IPv6. Even BGP-4, the version we still use today, predates IPv6: the first BGP-4 RFC (RFC 1654) was published in...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL