For over three decades, BGP’s AS_SET path segment has been a legal, if problematic, feature of Internet routing. In May 2025, the IETF formally ended that era. RFC 9774 doesn’t merely discourage AS_SET: it prohibits it entirely. This post unpacks...


For over three decades, BGP’s AS_SET path segment has been a legal, if problematic, feature of Internet routing. In May 2025, the IETF formally ended that era. RFC 9774 doesn’t merely discourage AS_SET: it prohibits it entirely. This post unpacks...
One of the characteristics of MPLS TE is that an established LSP (label Switched Path) is not torn down in the event of a bandwidth increase process failure...
Geo-blocking at the BGP level is an approach that allows network operators to restrict or control internet traffic by manipulating routing decisions based on...
MPLS-TP, short for Multi-Protocol Label Switching - Transport Profile, is a packet transport technology developed based on IP/MPLS. It is a result of...
The growth of data worldwide is expected to continue at an unprecedented rate, and the increase of Internet of Things (IoT) devices at the edge of the network...
Distributed denial-of-service (DDoS) attacks can be a major threat to the availability and security of networks. These attacks can overwhelm network resources...
In the previous article, we described different DDoS attacks and their impact on network infrastructure. We focused on the BGP flowspec (BGP-FS) based DDoS...
When it comes to distributed denial-of-service (DDoS) attacks, they are far from a downward trend. Although the popularity of certain types of DDoS attacks...
When there is a change in the reachability of one or more prefixes, BGP needs to do some work to adapt to that change and reach a new stable state. This is...
OSPF and BGP: Differences and Interactions When it comes to routing protocols, two of the most popular are OSPF (Open Shortest Path First) and BGP (Border...
In TCP, flags indicate a particular connection state, provide some additional helpful information for troubleshooting purposes, or handle control of a...
When it comes to IPv6, there are several categories of IPv6 addresses, each with its own use case. For example, IPv6 link-Local addresses are intended for...
BGP blackhole filtering is a routing technique used to drop unwanted traffic. Black holes are placed in the parts of a network where unwanted traffic should...
Modern networks are getting increasingly complex. So many things can go wrong with them. Business can suffer, and that is something we definitely want to...
Simple Network Management Protocol (SNMP) is a network application layer protocol, initially developed for network management but is now mainly used for...
BGP community attribute is a transitive optional attribute that we use for tagging (marking) a set of prefixes sharing a common property. Every BGP update...
The Internet consists of Internet Service Providers (ISPs) of all shapes and sizes. ISPs have two options when it comes to connecting to the Internet. They...
The Internet is for everyone, yet not everyone accepts that. In light of the news about Cogent Communications and Lumen Technologies disconnecting clients in...
What is Anycast? Anycast is not a new version of IP or the latest networking technology. The RFC 1546 describing Internet anycasting for IP has been with us...
