© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 i2rs Usecases for BGP draft-keyupate-i2rs-bgp-usecases-01.txt Keyur Patel,

Slides:



Advertisements
Similar presentations
An Operational Perspective on BGP Security Geoff Huston February 2005.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diverse Paths draft-ietf-grow-diverse-bgp-paths-dist-02 Keyur Patel.
Chapter 9: Access Control Lists
Routing Security Capabilities draft-zhao-opsec-routing-capabilities-02.txt OPSEC WG, IETF #66.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—2-1 BGP Transit Autonomous Systems Monitoring and Troubleshooting IBGP in a Transit AS.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Module Summary BGP has reliable transport provided by TCP, a rich set of metrics called BGP.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Limiting the Number of Prefixes Received from a BGP Neighbor.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 © 2003, Cisco Systems, Inc. All rights reserved. Computer Networks 6 Layer 3 troubleshooting Halmstad University Olga Torstensson
CS Summer 2003 Lecture 4. CS Summer 2003 Route Aggregation The process of representing a group of prefixes with a single prefix is known as.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Assessing Path Control Network Performance Issues.
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP AS AN MVPN PE-CE Protocol draft-keyupate-l3vpn-mvpn-pe-ce-00 Keyur Patel,
BGP Flow specification Update
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
Model-based Programmable Networks
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
© 2009 Voltaire Inc.1 Fabric Management in VM environment Marina Lipshteyn, Voltaire.
Virtual Topologies for Service Chaining in BGP IP/MPLS VPNs draft-rfernando-bess-service-chaining-00 (previously draft-rfernando-l3vpn-service-chaining-04)
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Accelerated Routing Convergence for BGP Graceful Restart draft-keyur-idr-enhanced-gr-00.
© 2001, Cisco Systems, Inc. A_BGP_Confed BGP Confederations.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Border Gateway Protocol (BGP) W.lilakiatsakun. BGP Basics (1) BGP is the protocol which is used to make core routing decisions on the Internet It involves.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Daniel Ginsburg Network Architect SR – Egress Peering Engineering.
I2RS Use Cases Summary Sue Hares. Plea to Authors Please help me make this readable I need your help to put in the right text.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Prefix Origin Validation State Extended Community draft-pmohapat-sidr-origin-validation-signaling-00.
Meet the Falcons Ciprian Marginean Aris Lambrianidis
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Filtering with Prefix-Lists.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Using BGP Route Dampening.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Implementing BGP Peer Groups.
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Improving BGP Convergence.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
IRS Use Case & Requirements Shane Amante Level 3 Communications, Inc. (Speaking on behalf of several Use Case and Requirement I-D’s co-authors)
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Monitoring and Troubleshooting BGP.
Text BGP Basics. Document Name CONFIDENTIAL Border Gateway Protocol (BGP) Introduction to BGP BGP Neighbor Establishment Process BGP Message Types BGP.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 BGP Diagnostic Message draft-raszuk-bgp-diagnostic-message-00 Robert Raszuk,
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
intra-va-01.txt -01 Draft of: “FIB Suppression with Virtual Aggregation and Default Routes” Paul.
Segment Routing: An Architecture build with SDN in mind and addressing the evolving network requirements Brian Meaney Cisco SP Consulting Team.
Interface to The Internet Routing System (IRS) Framework documents Joel Halpern IETF 84 – Routing Area Open Meeting 1.
19 March 2003Page 1 BGP Vulnerabilities Draft March 19, 2003 Sandra Murphy
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
draft-patel-raszuk-bgp-vector-routing-01
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
I2RS Use Cases Summary draft-ietf-i2rs-usecase-reqs-summary
BGP supplement Abhigyan Sharma.
Subscribing to YANG datastore push updates draft-netconf-yang-push-00 IETF #94 Yokohama A. Clemm A. Gonzalez Prieto
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
MPLS Traffic Engineering
BGP-Based SPF IETF 98, Chicago
BGP Instability Jennifer Rexford
Validating MANRS of a network
Presentation transcript:

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 i2rs Usecases for BGP draft-keyupate-i2rs-bgp-usecases-01.txt Keyur Patel, Rex Fernando, Hannes Gredler, Shane Amante, Russ White, Sue Hares

2 Motivation  IRS provides an alternative way to control and interact with routing protocols -Protocol Operation -Route Manipulation -Protocol diagnosis -Protocol Events -Filtering of overlapping BGP Traffic Engineering Routes  Control and Interaction through the use of well-known and standardized programmatic interfaces

3 Scope i2rs  Does NOT intend to replace any existing configuration mechanisms  Does NOT intend to replace any existing protocol mechanisms BGP  Document community’s understanding how i2rs can be used in context of BGP

4 Current Draft Status  Version 1 has merged BGP use cases from draft- keyupate-i2rs-bgp-usecases-00 and draft-white-i2rs- use-cases-00 as per WG’s feedback  Version 1 has removed BGP Protocol Configuration and Policy Configuration as per WG’s feedback  Authors would like to request for WG adoption

5 BGP Use Cases – Version 01  Registering BGP Protocol Operations -Error notifications for Internal BGP neighbors  Performing BGP Route Manipulation -Customized Best Paths -Flowspec Routes -RT Constraint for Legacy routers -Optimized Exit Control  Registering BGP protocol Events -Notification of Routing Events -Tracing of Dropped BGP Routes -BGP Protocol Statistics  Identify and Remove overlapping (TE) routes

6 BGP Use Cases – BGP Protocol Operation  Errors reported by BGP protocol within an AS  Errors reported by any EBGP Peers Current BGP protocol error reporting is done using router debugs and syslogs i2rs Controllers provide centralize command control to report and react against BGP protocol Errors

7 BGP Use Cases – BGP Route Manipulation  Customize Best Path Selection allows custom bestpath computations -Usually done using BGP cost communities  Flowspec address family is used to disseminate the traffic flow specifications  RT Constrain for legacy Routers  Optimized Exit Control is used to provide route optimization and efficient load distribution Current BGP Route manipulations are either done on routers or through some propietary orchestrators i2rs Controllers provide centralize command and control to push appropriate cost communities, flowspec routes, RT Filter routes on behalf of legacy routers, manipulate route parameters i2rs controllers can provide centralize monitoring for Flowspec routes and/or traffic flows

8 BGP Use Cases – BGP Protocol Events  Monitoring announcements and withdrawals of high visibility BGP routes  Monitoring dampening of high visibility BGP Routes  Monitoring filtering of BGP prefixes by policies, errors, etc.  Monitoring Protocol statistics -Neighbor based statistics -Route Statistics Currently, BGP protocol events are tracked though router debugs on routers or using automated scripts i2rs Controllers provide central command and control to monitor protocol events

9 BGP Use Cases – Removing Overlapping Routes  Monitoring BGP ADJ-RIB-IN and identify overlapping routes that can be safely removed  Insert filtering rules to remove or invalidate them Currently, BGP protocol routes are either monitored manually or using automated scripts i2rs Controllers provide central command and control to manipulate such BGP Routes

10 Questions?

11 BGP Use Cases – BGP Configuration  Protocol Configuration -Local BGP protocol configuration -Local BGP neighbor configuration  BGP Policy Configuration (Generic) -Avoid Unwanted Route Announcements (Generic Filters) -Facilitate Route Summarization -Defensive Security. Filter non-customer routers from stub customers Current BGP configuration is done using CLI, XML or NETCONF IRS Controllers provide centralize command control to push BGP Configurations