| 
 Description: 
In the context of the global Internet, BGP operation involves complex aspects that have recently been compounded by certain security events such as route hijacking and route leaks. 
This is a two-part tutorial. The first session will present an introduction to the BGP protocol, as well as recommendations and current best practices both for carrier/ISP as well as for end-user organization environments. 
The second part will introduce some trends in routing security, specifically origin validation using resource certification (RPKI). 
    Principles of BGP operation and best practices 
    Route hijacking and leaking 
              Resource certification (RPKI) 
    Creation of ROAs 
The tutorial will include hands-on exercises, so we recommend that participants bring their own laptop computers. 
 |