?
Solved

Examples of implementing restrictive filters limiting access to BGP (TCP 179)

Posted on 2004-04-27
1
Medium Priority
?
195 Views
Last Modified: 2010-08-05
Can anyone give me some examples of implementing  restrictive filters or access-list limiting access to BGP (TCP 179) to only the necessary peers.

example configs:

router bgp 70000
network 206.25.32.0 mask 255.255.255.248
neighbor 200.4.3.98
0
Comment
Question by:ritru
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 11

Accepted Solution

by:
PennGwyn earned 375 total points
ID: 10933189
Like

access-list 101 permit tcp host 200.4.3.98 any eq 179
access-list 101 deny tcp any any eq 179
access-list 101 permit ip any any

interface Serial0/0
access-group 101 in

But that's cumbersome, and you may already be using an access-list on that interface.  And it won't protect you from somebody spoofing your neighbor's address as the source.

A simpler approach is to encrypt the link:

neighbor 200.4.3.98 password "oursharedsecret"

which will allow BGP packets only if they come from somebody who has the same secret configured on their neighbor statement pointing at you.

(This is the recommended fix for the issue that Cisco and others raised last week....)
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question