BGP Route

BGP Configuration Best Practices

What can be done (and what has been done) about it This is the final installment in the BGP security series and covers BGP configuration best practices. Since BGP lacks an intrinsic mechanism to secure routing, several mechanisms have been adopted to overcome this limitation. Among them, RPKI is the…

Read more

Vulnerabilities of BGP

This blog is the fifth and final installment of a 5-part blog series about the Border Gateway Protocol (BGP). You can download the full series in The Comprehensive Guide to BGP, or view individual installments below. Part 1: Happy Birthday to BGP, a Pillar of the Modern InternetPart 2: X-Raying BGPPart…

Read more