Blog

Blog

BGP security

In our last post, we looked at protecting the TCP session that carries BGP information between two routers, mainly against spoofed TCP resets. However,...

MD5 password

Back in the late 1980s and the early 1990s when BGP was developed, security was still an afterthought for protocols used on the internet....

route optimizers

Yesterday, an incident occurred where an Autonomous System (AS) advertised more than 7,000 prefixes that belong to other networks. These are “more specific” prefixes—subsets...

Peering policy

As discussed in earlier posts, as networks grow larger it starts making sense to exchange traffic with other networks directly (peering) rather than pay...

IPv4 BGP vs IPv6 BGP

BGP is older than IPv6. Even BGP-4, the version we still use today, predates IPv6: the first BGP-4 RFC (RFC 1654) was published in...

packet loss

As explained in our last blog post, packet loss and latency can seriously impact application performance. There's not much we can do about latency,...

packet loss

The triumvirate of network performance metrics are latency, loss and jitter. Today, we're going to take a look at how each of them —...

network downtime

Business people often believe that in order to have a reliable system, you need reliable components. Using reliable components to build your network certainly...

BGP OSPF

In some ways, BGP is nice and simple. For instance, there's only one BGP: BGP version 4. Many network professionals have been asking the...

At home, we pay an ISP to transport our packets to and from the rest of the world. Most organizations do the same. But...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL