Description:
In the context of the global Internet, BGP operation involves complex aspects that have recently been compounded by certain security events such as route hijacking and route leaks.
This is a two-part tutorial. The first session will present an introduction to the BGP protocol, as well as recommendations and current best practices both for carrier/ISP as well as for end-user organization environments.
The second part will introduce some trends in routing security, specifically origin validation using resource certification (RPKI).
Principles of BGP operation and best practices
Route hijacking and leaking
Resource certification (RPKI)
Creation of ROAs
The tutorial will include hands-on exercises, so we recommend that participants bring their own laptop computers.
|