For over three decades, BGP’s AS_SET path segment has been a legal, if problematic, feature of Internet routing. In May 2025, the IETF formally ended that era. RFC 9774 doesn’t merely discourage AS_SET: it prohibits it entirely. This post unpacks...


For over three decades, BGP’s AS_SET path segment has been a legal, if problematic, feature of Internet routing. In May 2025, the IETF formally ended that era. RFC 9774 doesn’t merely discourage AS_SET: it prohibits it entirely. This post unpacks...
The Border Gateway Protocol (BGP) serves as the lifeblood of the internet, facilitating the exchange of routing information between vast networks. However, a...
After reading the title of this article you may be thinking of small neighborhoods in the world's most-connected cities where BGP-minded people live together,...
Over the recent weekend, the digital world faced a stark reminder of its vulnerabilities when Seacom, a crucial link in Africa's connection to the global...
Effective network monitoring plays a crucial role in modern network management. To achieve this, protocols like NetFlow v9 and IPFIX utilize various key...
When it comes to keeping tabs on networks, we’ve got two heavy hitters: NetFlow and packet capture. They are both crucial for understanding what's going on in...
RFC 9234 introduces a novel mechanism that leverages the BGP Role to prevent and detect route leaks. BGP leaks occur when incorrect routing information is...
One of the characteristics of MPLS TE is that an established LSP (label Switched Path) is not torn down in the event of a bandwidth increase process failure...
Geo-blocking at the BGP level is an approach that allows network operators to restrict or control internet traffic by manipulating routing decisions based on...
MPLS-TP, short for Multi-Protocol Label Switching - Transport Profile, is a packet transport technology developed based on IP/MPLS. It is a result of...
The growth of data worldwide is expected to continue at an unprecedented rate, and the increase of Internet of Things (IoT) devices at the edge of the network...
Distributed denial-of-service (DDoS) attacks can be a major threat to the availability and security of networks. These attacks can overwhelm network resources...
In the previous article, we described different DDoS attacks and their impact on network infrastructure. We focused on the BGP flowspec (BGP-FS) based DDoS...
