Sie sind auf Seite 1von 15

KOLEJ TEKNOLOGI YPC IT-WEB

NETWORK AND INFORMATION SYSTEM 1


6507 TECYPCA
ASSIGNMENT 2

PREPARED BY:
NAME

INTAKE

I/D NUMBER

WONG KAH CHUN

BEM 1222 F3

B121041

LIEW KAH MAN

BEM 1222 F3

B121030

CHOW KAH YAN

BEM 1222 F3

B121021

VALARMATHY A/P U.AYE


MAUNG

BEM 1223 F3

B121070

PREPARED FOR:
MISS ROSLAILY

SUBMISSION DATE: 17TH NOVEMBER 2014

CONTENTS
INTRODUCTION................................................................................................................................. 3
What is BGP? ..................................................................................................................................... 3
Sample of BGP ................................................................................................................................... 4
HOW BGP WORKS? ........................................................................................................................... 5
BGP OPERATIONAL REQUIREMENTS: ...................................................................................... 5
a.

Bandwidth and CPU Requirements: ......................................................................................... 5

b.

Memory Requirements:.............................................................................................................. 6

STRENGTHS ........................................................................................................................................ 6
a.

Flexibility.................................................................................................................................... 6

b.

Scalability ................................................................................................................................... 6

c.

Reliability.................................................................................................................................... 6

d.

Stability ....................................................................................................................................... 7

WEAKNESSES ..................................................................................................................................... 7
a.

Slow Convergence: ..................................................................................................................... 7

b.

Routing Table Growth: .............................................................................................................. 7

c.

Load Balance: ............................................................................................................................ 7

CONFIGURATION .............................................................................................................................. 8
Network Diagram ....................................................................................................................... 8

a.
i.

Configuration to Receive Full Internet Routing Table ........................................................... 8

ii.

Configuration to Receive Directly-Connected Routes .......................................................... 10

iii. Configuration to Receive Default Routes Only ..................................................................... 12


b.

Verify ........................................................................................................................................ 14

c.

Troubleshoot............................................................................................................................. 14

CONCLUSION ................................................................................................................................... 14
REFERENCES .................................................................................................................................... 15

INTRODUCTION
What is BGP?
A Border Gateway Protocol is a path vector routing protocol that coordinates the
routing of packets through multiple administrative domains by computing routes between
every IP address the packet passes. Certain routers, called BGP speakers, are assigned to run
the protocol. BGP speakers across different Autonomous Systems (AS) are interconnected in
order to exchange routing information.
BGP supports a feature called multi homing, which means connecting to multiple
ISPs from different routers or points in the network. However, BGPs still have several serious
security vulnerabilities, which are currently being addressed.
The Border Gateway Protocol (BGP) can be seen as the core inter domain routing
protocol of the Internet. It is an inter-autonomous system routing protocol designed for
TCP/IP networks which maintains a table of IP network prefixes that designate network
reachability among autonomous systems. BGP is a path vector protocol which makes routing
decisions based on paths and network policies instead of using conventional Interior Gateway
Protocol (IGP) metrics.

The main role of a BGP system is to exchange network reachability information with
other BGP systems. The Internet is a very large-scale decentralized network consisting of
smaller networks. When a packet is sent across the Internet it may pass through multiple
networking administrative domains, so-called Autonomous Systems (AS).
The inter domain routing of all ASs on the Internet is coordinated by the Border
Gateway Protocol (BGP) running on routers that connect the ASs. The task of BGP is to
compute routes between every AS and every IP address that a packet is passing on its way
from one computer to another. BGP is the
Inter domain routing protocol used to exchange reachability information between ASs on the
Internet. To choose best routes, BGP allows each AS to override distance based metrics with
policy based metrics.

Sample of BGP

HOW BGP WORKS?


When a BGP router first comes up on the Internet, either for the first time or after being
turned off, it establishes connections with the other BGP routers with which it directly
communicates. The first thing it does is download the entire routing table of each neighboring
router. After that it only exchanges much shorter update messages with other routers.

BGP routers send and receive update messages to indicate a change in the preferred path to
reach a computer with a given IP address. If the router decides to update its own routing
tables because this new path is better, then it will subsequently propagate this information to
all of the other neighbouring BGP routers to which it is connected, and they will in turn
decide whether to update their own tables and propagate the information further.

BGP uses the TCP/IP protocol on port 179 to establish connections. It has strong security
features, including the incorporation of a digital signature in all communications between
BGP routers.

Each BGP router contains a Routing Information Base (RIB) that contains the routing
information maintained by that router.

BGP OPERATIONAL REQUIREMENTS


a. Bandwidth and CPU Requirements:
After the initial BGP connection setup, the peers exchange complete set of routing
information, this is the stage where BGB requires the highest number of CPU cycles,
after the initial exchange KEEPALIVE alive messages are exchanged between peers
every 30 sec's the amount of CPU cycles consumed by BGP completely depends on
the stability of the internet, if the internet is stable KEEPALIVE messages take a very
negligible amount of CPU cycles.

b. Memory Requirements:
BGB memory requirements depends on how much routing information we choose to
receive, if we only accept defaults routes from the providers, then it will not require
more than the standard router memory, however running full tables is very intensive.

STRENGTHS
BGP is an inter-Autonomous System routing protocol. The primary function of a BGP
speaking system is to exchange network reachability information with other BGP systems (T,
Rekhter, & Hares). BGP is used to exchange routing information for the Internet and is the
protocol used between Internet service providers (ISP).
a. Flexibility
Unlike IGP, BGP is more of a policy definition tool rather than just a routing
protocol, to select the best route, BGP assigns 11 attributes to each path, and one of
the most important path attributes is the Autonomous System path, or AS_PATH, The
AS_PATH allows straightforward suppression of the
information.

looping of routing

The AS_PATH serves as a powerful and versatile mechanism for

policy-based routing in addition each of this attributes can be administratively tuned


for extremely granular control, in contrast IGP protocols are designed with intent to
provide reachability and fast convergence.

b. Scalability
Unlike IGP, BGP can handle thousands of routes in its database, BGP was designed to
scale with the growth of the internet, the mechanism which BGB is built have allowed
it to scale to carry more than 200,000 prefixes in production networks and more than
500,000 prefixes in laboratory test. The only practical limit to the number of prefixes
supported is memory in the router.

c. Reliability
BGP makes use of TCP for reliable transport of its traffic between peer routers (T,
Rekhter, & Hares), rather than re-inventing the wheel, BGB takes advantage of all

TCP functions such as fragmentation, retransmission, acknowledgement and


sequencing, it can also use any authentication scheme used by TCP, this greatly
enhances BGB capabilities in connection establishment, maintenance and routing
information accuracy.

d. Stability
Given the size of current internet, flapping of large number of network routes could
be disastrous, to overcome this BGP has a number of features which suppresses
instability, e.g. route damping, implementing various timers, soft reconfiguration and
route refresh are useful for changing BGB policy without resetting the BGP session.

WEAKNESSES
a. Slow Convergence:
BGP is the slowest protocol out of all, BGP's lack of policy synchronization often
leads to convergence concerns, the reason it is slow is by design, imagine there is a
network on the internet which went down, if BGP were to trigger an update every
time a network goes down to all the routers on the internet, internet would always be
in a state of kiosk.

b. Routing Table Growth:


Internet is growing at an exponential rate every year, if the global routing tables
grows to the point where older, less capable routers cannot cope with the memory
/cpu requirements, these routers will cease to be effective gateways between the parts
they connect to, leaving network services unreliable or even unavailable in the
interim. (Wikipedia)

c. Load Balance:
BGP does not load balance across links by default.

CONFIGURATION
In this section, user is presented with the information to configure the features described in
this document.
Note: Use the Command Lookup Tool (registered customers only) to find more information
on the commands used in this document.
a. Network Diagram
This document uses this network setup in figure 1.1:
Figure 1.1 Configuration of border gateway protocol(BGP).

In that network diagram, 1.0.0.0/8 and 2.0.0.0/8 are advertised by AS 300 to the outside.
i.

Configuration to Receive Full Internet Routing Table

The following configuration allows Router A to peer with BGP speakers in other autonomous
systems. The route-map local only allows only the locally generated routes to be advertised to
both of the service providers. In other words, they filter the Internet routes from one service
provider that go back to the other service provider. This prevents the risk that the autonomous
system will become a transit AS for Internet traffic.

Note: Cisco recommends 1 GB of memory for the entire Internet routing table from a single
peer.
Router A
Current configuration:

router bgp 300


network 1.0.0.0
network 2.0.0.0

neighbour 10.10.10.10 remote-as 100


neighbour 10.10.10.10 route-map local only out

!--- Outgoing policy route-map that filters routes to


service provider A (SP-A).

neighbour 20.20.20.20 remote-as 200


neighbour 20.20.20.20 route-map local only out

!--- Outgoing policy route-map that filters routes to


service provider B (SP-B).

End
This AS-Path access list only permits locally originated BGP routes:
ip as-path access-list 10 permit ^$
This is an example of a route map that uses that AS-Path access list to filter the routes
advertised to the external neighbours in the service provider networks: route-map local only
permit 10, match as-path 10

ii.

Configuration to Receive Directly-Connected Routes

Router A
Current configuration:

router bgp 300


network 1.0.0.0
network 2.0.0.0

neighbour 10.10.10.10 remote-as 100


neighbour 10.10.10.10 route-map local only out

!--- Outgoing policy route-map that filters routes to


SP-A.

neighbour 10.10.10.10 route-map as100only in

!--- Incoming policy route-map that filters routes from


SP-A.

neighbour 20.20.20.20 remote-as 200


neighbour 20.20.20.20 route-map local only out

!--- Outgoing policy route-map that filters routes to


SP-B.

neighbour 20.20.20.20 route-map as200only in

!--- Incoming policy route-map that filters routes from


SP-B.

End

Due to author only want to accept routes that are directly connected to the service providers,
author must filter the routes that they send to user, as well as the routes that author advertise.
This access list and route map permit only locally originated routes; use it to filter outbound
routing updates:
ip as-path access-list 10 permit ^$

!--- Configuring the as-path access-list 10 as


!--- IP as-path access-list 10 permit ^$, means that the router
!--- will only send the prefixes which are generated locally in
!--- AS 300 where it is not from other AS.

Route-map local only permit 10

match as-path 10

This access list and route map filter out anything that is not sourced within the first service
provider network; use it to filter the routes that are learned from service provider A (SP-A).
ip as-path access-list 20 permit ^100$

route-map as100only permit 10


match as-path 20
This access list and route map filter out anything that is not sourced within the second service
provider network; use it to filter the routes that are learned from service provider B (SP-B).
ip as-path access-list 30 permit ^200$

route-map as200only permit 10

match as-path 30

Author also need two default routes that are distributed back into the rest of the network, one
pointed to each of the service provider entry points:
IP route 0.0.0.0 0.0.0.0 10.10.10.10
IP route 0.0.0.0 0.0.0.0 20.20.20.20

iii.

Configuration to Receive Default Routes Only

Router A
Current configuration:

router bgp 300


network 1.0.0.0
network 2.0.0.0

neighbour 10.10.10.10 remote-as 100


neighbour 10.10.10.10 route-map local only out

!--- Outgoing policy route-map that filters routes to


SP-A.

neighbour 10.10.10.10 prefix-list ABC in

neighbour 20.20.20.20 remote-as 200


neighbour 20.20.20.20 route-map local only out

!--- Outgoing policy route-map that filters routes to


SP-B.

neighbour 20.20.20.20 prefix-list ABC in

ip prefix-list ABC sequence 5 permit 0.0.0.0/0

!--- Prefix list to allow only default route updates.

End
Due to request, it want Router A to receive only default routes and no other networks from
SP-A and SP-B, author must permit only the default route and deny all other BGP updates.

Use this prefix list to allow only the default route update 0.0.0.0/0 and to deny all other BGP
updates on Router A:
IP prefix-list ABC seq 5 permit 0.0.0.0/0
Apply that prefix list on the inbound updates on individual BGP neighbours in this way:

neighbour 10.10.10.10 prefix-list ABC in

neighbour 20.20.20.20 prefix-list ABC in

For more information on how to configure a prefix list, refer to the Configuring BGP
Filtering Using Prefix Lists section of Configuring BGP
For explanations of what each command does, refer to Configuring BGP and BGP
Commands.
For the configuration to be success as figure 1.1 shown, a few components are used. The
information in this document is based on Cisco 2500 Series Routers that run Cisco IOS
Software Release 12.2(27). The information in this document was created from the devices in
a specific lab environment. All of the devices used in this document started with a cleared
(default) configuration. If the network is live, make sure that user understand the potential
impact of any command.
As for the background information, if user wants to receive the full Internet routing table, use
the Configuration to Receive Full Internet Routing Table on the local router.
If user wants to receive routes that are directly connected to the service providers, but use
default routes to the rest of the Internet, try the Configuration to Receive Directly-Connected
Routes.
If user wants to receive only default routes from the directly connected service providers, use
the Configuration to Receive Default Routes Only.
For more information about the regular expressions used in the configurations in this
document, refer to Using Regular Expressions in BGP.

b. Verify
Use this section to confirm that the configuration works properly.
The Output Interpreter Tool (registered customers only) (OIT) supports certain show
commands. Use the OIT to view an analysis of show command output.
Author can use the show ip route and show ip bgp commands to check the IP routing table
and BGP routing table entries.
c. Troubleshoot
There is currently no specific troubleshooting information available for the configuration.

CONCLUSION
The characteristics of Border Gateway Protocol are as follow:
1.

BGP is an exterior gateway protocol (EGP) used in routing in the Internet. It is an


inter-domain routing protocol.

2.

BGP is a path vector routing protocol suited for strategic routing policies.

3.

BGP uses TCP Port 179 to establish connections with neighbours.

4.

BGPv4 implements CIDR.

5.

eBGP is for external neighbours. It's used between separate autonomous systems.

6.

iBGP is for internal neighbours. It's used within an AS.

7.

BGP uses several attributes in the routing-decision algorithm.

8.

BGP uses confederations and route reflectors to reduce BGP peering overhead.

9.

The MED (metric) attribute is used between autonomous systems to influence


inbound traffic.

10.

Weight is used to influence the path of outbound traffic from a single router,
configured locally.

As the author mentioned, there are large numbers of different path attributes that can be used
by BGP to control how the traffic for a specific network is routed. These attributes are
ordered so a priority exists if multiple routes to the same destination exist, and these will be

analysed in order until the tie is broken (some minor difference occur depending on the
platform vendor).
Even broken down like this, BGP is simply a beast; many network engineers can go through
their whole networking careers without ever having to deal with a BGP network. For those
looking to work at larger enterprises and service providers, however, a close familiarity with
BGP is essential. Hopefully the content in this article will get the reader started and begin the
long path towards becoming BGP expert.

REFERENCES

Cisco (2014) Sample Configuration for BGP with Two Different Service Providers
(Multihoming)[ONLINE] Available at:
http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/2367527.html [Accessed 16 November 2014]

CCDA Official Exam Certification Guide (Exam 640-863), 3rd Edition, By Anthony
Bruno, Steve Jordan, published Jun 11, 2007 by Cisco Press. Part of the Official Cert
Guide series.

SQL Server, Vmware, Microsoft Clustering, HyperV, RedHat Clustering &


Networking (2014) EIGRP, OSPF & BGP Strengths, weakness, operational
requirements

and

commercial

implementation.

[ONLINE]

Available

http://huzeifabhai.blogspot.com/2011/08/eigrp-ospf-bgp-strengths-weakness.html
[Accessed 16 November 2014]

at:

Das könnte Ihnen auch gefallen