Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Don't use bgp weight attribute as it's proprietary to Cisco. Use localpref, med/metric, and as-path length.

Adbot
ADBOT LOVES YOU

Slickdrac
Oct 5, 2007

Not allowed to have nice things
Or just say screw it and let serial numbers sort it out

CrazyLittle
Sep 11, 2001





Clapping Larry

falz posted:

Don't use bgp weight attribute as it's proprietary to Cisco. Use localpref, med/metric, and as-path length.

Yeah, this. I had to find out the hard way when I started integrating non-cisco hardware into my BGP peers.

doomisland
Oct 5, 2004

Methanar posted:

Do you you have to phone other network admins responsible for other AS numbers to request changes?

IRC is usually faster

Computer Serf
May 14, 2005
Buglord
how loving deep does this enterprise rabbit hole go


:can: :psypop:

Collateral Damage
Jun 13, 2009

1998 called and wanted their clip art back.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
They also want their XML based configuration back.

ate shit on live tv
Feb 15, 2004

by Azathoth

Collateral Damage posted:

Does anyone know why some Aironet 3702i would trigger BPDU guard on a connected Cisco 2960-X, while most others don't? As far as I can see the configuration in the APs are identical.

Is it an autonomous AP? Because if so, I'd say because it is sending tagged frames.

ate shit on live tv
Feb 15, 2004

by Azathoth

Methanar posted:

Alright just for fun I'm playing with BGP and set up a simple network. All the basic configuration is done with ospf/eigrp redistributed into the bgp. Everything works.
I want to try and force the AS 200 router to send traffic destined for 30.30.30.0/24 over to AS 300 and then let AS 300 handle the traffic, instead of how it currently is where AS 200 sends directly to AS 100.




On the AS 200 router I set a weighting for the 86.55.14.2 neighbour so ALL traffic will be sent down that link, except for directly connected stuff. That's pretty cool but it's not quite what I wanted.

code:
AS200(config-router)# neighbor 86.55.14.2 weight 500

Next attempt was to create a route map to weight the traffic.

code:
AS200# configure terminal
AS200(config)# access-list 3 permit 30.30.30.0 0.0.0.255

AS200(config)# route-map MAP-30.30.30.0/24 permit 10
AS200(config-route-map)# match ip address 3
AS200(config-route-map)# set weight 100
AS200(config-route-map)# route-map MAP-30.30.30.0/24 permit 20

AS200(config)# router bgp 200
AS200(config-router)# neighbor 201.34.52.23 route-map MAP-30.30.30.0/24 in

Now, both of these worked, but if I had several hundred preferences with and across multiple AS's, with meaningful internal routing occurring this would be a nightmare. What is the proper way of handling bgp preferences? Do you you have to phone other network admins responsible for other AS numbers to request changes?

If you control AS200, it easy to control your egress traffic without talking to the other AS's. Local Preference should do the trick for the network you are interested in. If you want to treat a particular link to an AS as a back up and you are learning all networks from both, you can set local-preference on import.

Note that all this stuff ONLY affects traffic outgoing, incoming traffic is significantly more difficult to influence.

Methanar
Sep 26, 2013

by the sex ghost

quote:

bgp

Neat.

While I'm at it, does anyone have some good ideas for interesting situations that I should try to model and play with?

ate shit on live tv
Feb 15, 2004

by Azathoth
Speaking of BGP fun. I requested a /27 from our carrier, GTT. They gave it to me, and then I advertised it to them via BGP. I couldn't get ping to work, so obviously it was an issue with them not accepting the prefix. I open the ticket and was informed they only accept /24's :downs:

Anyway, 'Tier2' whatever that is, made changes to the import policy so I'm good to go now.

ate shit on live tv
Feb 15, 2004

by Azathoth

Methanar posted:

Neat.

While I'm at it, does anyone have some good ideas for interesting situations that I should try to model and play with?

Create a transit AS with 5 or so AS's. Then figure out how to prevent it.

For extra credit think about why you normally wouldn't want to be a transit AS on the internet.

Methanar
Sep 26, 2013

by the sex ghost

Powercrazy posted:

Create a transit AS with 5 or so AS's. Then figure out how to prevent it.

For extra credit think about why you normally wouldn't want to be a transit AS on the internet.

Because 50gbits of netflix

Filthy Lucre
Feb 27, 2006
Most providers don't accept anything larger than a /24 prefix via BGP to keep the global table from getting out of hand.

I'm guessing you have two connections to GTT and are just doing BGP with them for redundancy? I can't imagine any other carrier accepting a /27 from some one else's allocation via BGP.

Filthy Lucre
Feb 27, 2006

Methanar posted:

Neat.

While I'm at it, does anyone have some good ideas for interesting situations that I should try to model and play with?

Start introducing iBGP inside your AS. For example, in AS200 you would have separate routers connected to AS100 and AS300.

Build a large BGP core in a single AS (4+ routers). Then collapse that into a 2 router core with Route Reflectors.

KS
Jun 10, 2003
Outrageous Lumpwad

Powercrazy posted:

Speaking of BGP fun. I requested a /27 from our carrier, GTT. They gave it to me, and then I advertised it to them via BGP. I couldn't get ping to work, so obviously it was an issue with them not accepting the prefix. I open the ticket and was informed they only accept /24's :downs:

Anyway, 'Tier2' whatever that is, made changes to the import policy so I'm good to go now.

That's weird. I thought /24 is the accepted minimum for the global BGP table to the point that multi homing is an instant justification for a /24 (well, up until depletion).

Hopefully they summarize somewhere.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

Powercrazy posted:

Speaking of BGP fun. I requested a /27 from our carrier, GTT. They gave it to me, and then I advertised it to them via BGP. I couldn't get ping to work, so obviously it was an issue with them not accepting the prefix. I open the ticket and was informed they only accept /24's :downs:

Anyway, 'Tier2' whatever that is, made changes to the import policy so I'm good to go now.

I had some fun times with GTT supporting us sending them a /25+/24 pair over 2 circuits (each sent a different /25 with NO-EXPORT of the aggregate /24). Talked to design, said everything was fine. Talk to implementation tech, said everything was in place. Sent traffic to each /25, all traffic went over one link. Took a few days of emailing to finally get it sorted out.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

Methanar posted:

Neat.

While I'm at it, does anyone have some good ideas for interesting situations that I should try to model and play with?

I would add in IS-IS, set up some route redistribution between each protocol, possibly BGP confederation, MED, communities (both exporting and importing).

22 Eargesplitten
Oct 10, 2010



I'm studying for my CCENT and I'm not quite clear on something. When you summarize a route, you're basically creating a secondary routing table for the summarized addresses in the same router, right?

CrazyLittle
Sep 11, 2001





Clapping Larry

KS posted:

That's weird. I thought /24 is the accepted minimum for the global BGP table to the point that multi homing is an instant justification for a /24 (well, up until depletion).

Hopefully they summarize somewhere.

Was instant justification until the ipv4 supply ran out. Now ARIN tells you to buy/rent portable address space from your ISP, or go buy some from an IPv4 scalper. Also prefixes >/24 are still rejected by the vast majority of peering orgs and I don't see that changing after ARIN flatly rejected the vote delegate prefixes > /24

All pressure is to move to IPv6 now anyways.

KS
Jun 10, 2003
Outrageous Lumpwad
I did reference depletion.

22 Eargesplitten posted:

I'm studying for my CCENT and I'm not quite clear on something. When you summarize a route, you're basically creating a secondary routing table for the summarized addresses in the same router, right?

If a router knows how to get to a bunch of small networks and they all go to the same next hop, you can set the router to summarize that route into a bigger network that contains all of the smaller ones.

Example:
10.10.10.0/24
10.10.11.0/24
10.10.12.0/24 could be summarized as 10.10.8.1/21

That router can then be set to distribute the summary route instead of a bunch of smaller routes when it talks to other routers. This keeps the routing table smaller and easier to manage.

22 Eargesplitten
Oct 10, 2010



Okay. So the router doing the summarization has all of the routes in its table, but it tells the other routers on the network that it has the summarized routes instead.

KS
Jun 10, 2003
Outrageous Lumpwad
Yeah. Summarization is all about what it advertises.

ragzilla
Sep 9, 2005
don't ask me, i only work here


KS posted:

Yeah. Summarization is all about what it advertises.

Careful when using this with BGP, summarization happens on a timer- but the router will advertise all prefixes it receives as soon as it gets them, then withdraw them later when they get summarized. This could be a bad thing if one or more of your peers has a max-prefix facing you.

ate shit on live tv
Feb 15, 2004

by Azathoth

Filthy Lucre posted:

Most providers don't accept anything larger than a /24 prefix via BGP to keep the global table from getting out of hand.

I'm guessing you have two connections to GTT and are just doing BGP with them for redundancy? I can't imagine any other carrier accepting a /27 from some one else's allocation via BGP.

Only have a single connection with GTT, but also have a connection with Zayo. We advertise our Arin assigned block to both. However we want an additional provider specific IP block to terminate some AWS vpns so we can do some crude traffic engineering from AWS Tokyo.

The point is, GTT is advertising the supernet, a /17 or something and they gave us a /27 that will stay within their AS, so the usual /24 wouldn't apply in this case.

ate shit on live tv
Feb 15, 2004

by Azathoth

Methanar posted:

Because 50gbits of netflix

Now how do you prevent becoming a Transit AS?

doomisland
Oct 5, 2004

Powercrazy posted:

Now how do you prevent becoming a Transit AS?

bgpq3 :getin:


e: also upgrade your ScreenOS devices http://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue

Not as shocking as it initially reads. You need administrative access to the device to do any decryption.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

H.R. Paperstacks posted:

Not as shocking as it initially reads. You need administrative access to the device to do any decryption.

I read that there were 2 vulnerabilities: one that let you gain administrative access over SSH/telnet, and another that let you decrypt VPN traffic.

e: here's the link - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713&actp=search

madsushi fucked around with this message at 02:15 on Dec 18, 2015

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue

madsushi posted:

I read that there were 2 vulnerabilities: one that let you gain administrative access over SSH/telnet, and another that let you decrypt VPN traffic.


e: here's the link - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713&actp=search

In order to decrypt the VPN traffic, you need to have administrative access to the device via SSH. In order to exploit the SSH/Telnet vulnerability, you need to have the ability to get at the control plane of the device. Typical CPP and BCP when it comes to securing a device stops both of these issues.

I only allow SSH to devices from a specific subnet on a specific interface, one that is in an OOB network, or a separate VRF at minimum.

abigserve
Sep 13, 2009

this is a better avatar than what I had before

Powercrazy posted:

If you control AS200, it easy to control your egress traffic without talking to the other AS's. Local Preference should do the trick for the network you are interested in. If you want to treat a particular link to an AS as a back up and you are learning all networks from both, you can set local-preference on import.

Note that all this stuff ONLY affects traffic outgoing, incoming traffic is significantly more difficult to influence.

I think most carriers will honor the AS-PATH you set so prepending is generally the fastest way to influence inbound routing. I could be wrong though.

In other news has anyone configured a noviflow-based openflow lab? Our carrier just publicly announced their testbed for this active and it looks sweet (if you like Java).

ate shit on live tv
Feb 15, 2004

by Azathoth

H.R. Paperstacks posted:

In order to decrypt the VPN traffic, you need to have administrative access to the device via SSH. In order to exploit the SSH/Telnet vulnerability, you need to have the ability to get at the control plane of the device. Typical CPP and BCP when it comes to securing a device stops both of these issues.

I only allow SSH to devices from a specific subnet on a specific interface, one that is in an OOB network, or a separate VRF at minimum.

Right. In addition this only affects a narrow range of OS releases. So while it's significant, I think even though Screen has a huge deployment, the actual number of compromised scenario's is low.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

H.R. Paperstacks posted:

I only allow SSH to devices from a specific subnet on a specific interface, one that is in an OOB network, or a separate VRF at minimum.

If you're doing things securely, sure. But you can look at any of the internet port scans to see that there's plenty of stuff with admin access exposed to the internet. When I was doing consulting, I saw many environments where administrative access was open publicly so their team could "remote in" to fix things. I am sure there are tons of ScreenOS boxes with the SSH box ticked in their Untrust interface settings, and the fact that they could be totally owned is bad.

ate shit on live tv
Feb 15, 2004

by Azathoth

abigserve posted:

I think most carriers will honor the AS-PATH you set so prepending is generally the fastest way to influence inbound routing. I could be wrong though.

In other news has anyone configured a noviflow-based openflow lab? Our carrier just publicly announced their testbed for this active and it looks sweet (if you like Java).

Only takes one transit AS to strip the duplicate path, and then it does nothing.

inignot
Sep 1, 2003

WWBCD?
I guess ScreenOS isn't dead yet?

ate shit on live tv
Feb 15, 2004

by Azathoth

inignot posted:

I guess ScreenOS isn't dead yet?

Banks and credit processors.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

Only takes one transit AS to strip the duplicate path, and then it does nothing.

I don't think I've ever seen an implementation which does this, but prepending everything to TE a single remote AS is a pain in the rear end, and kind of a blunt object approach. Ideally your transit will have prepend communities (to prepend to a specific peer of theirs- they usually don't implement this on customer sessions), or path poisoning is the other trick if you need to TE an AS that's 1+ hops out.

ate shit on live tv
Feb 15, 2004

by Azathoth

ragzilla posted:

I don't think I've ever seen an implementation which does this, but prepending everything to TE a single remote AS is a pain in the rear end, and kind of a blunt object approach. Ideally your transit will have prepend communities (to prepend to a specific peer of theirs- they usually don't implement this on customer sessions), or path poisoning is the other trick if you need to TE an AS that's 1+ hops out.

Hmm.

Well how about this scenario. We have multiple providers and we are trying to get to a remote AS, (AWS Tokyo) from New York. Somewhere in the BGP chosen return path is congestion/loss/internet fuckery. So our ~200Mb/s SCP transfer speeds drop to 150kb/s. AS-prepend didn't redirect the return path traffic for whatever reason, but withdrawing the prefix from one of our providers, using a do not advertise community did work to shift return traffic to the other provider, and more importantly fixed the slow transfer speeds.

What would you do to address it? Note that i'm not a carrier or anything, this is just our own prefix from our own AS, dual homed.

ate shit on live tv fucked around with this message at 04:55 on Dec 18, 2015

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
out of curiousity, at what size of business (bank if it matters) should I be to (be worried about) get my own AS?

Adbot
ADBOT LOVES YOU

ate shit on live tv
Feb 15, 2004

by Azathoth

adorai posted:

out of curiousity, at what size of business (bank if it matters) should I be to (be worried about) get my own AS?

If you host public web services and have IPv4 space, you should have your own AS number. They are easy to get unlike IP addresses.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply