advrourpki-pacnog25


Dates: 3 - 6 December 2019
Location: Suva, Fiji
Venue: University of South Pacific

Target Audience

  • Technical staff who are now building or operating a service provider network with international and/or multi-provider connectivity, or considering participation at an Internet Exchange point.

Synopsis

  • Why do we keep seeing news headlines about major networks not being reachable because traffic got rerouted to somewhere else? BGP mishaps are very common and frighteningly very easy. Examples are malicious route hijacking, mis-origination (fat fingers), and bad filters (route leaks). We need better mechanism to ensure no one can inject false information into the global routing system that easily.
  • This workshop will look at current tools/techniques, how rPKI is just a piece in the puzzle, and what we should to secure the internet routing instead of waiting for an ideal solution that fixes all issues.

Pre-requisites

  • It is assumed that the workshop participants have a working knowledge of an OSPF/IS-IS and BGP fundamentals, along with know how to use a router command line interface.
  • This workshop is not an introduction. The lab exercises use Cisco IOS configuration syntax.

Other Requirements

  • Hardware: Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
  • Software: SSH Client, Telnet Client (PuTTy)

Workshop topics

  • Internet Routing Basics (recap)
  • Address Planning (IPv6) and traffic engineering
  • BGP Fundamentals (recap)
  • BGP Scaling techniques
  • BGP Attributes and Policy Control
  • Internet Multihoming Techniques
  • BGP Operations and Security best practices
  • BGP Filtering techniques
  • Resource PKI fundamentals
  • BGP Filtering with ROA (Route Origin Validation)
  • BGP AS-path validation

Workshop Items

  • advrourpki-pacnog25.txt
  • Last modified: 2021/06/17 04:32
  • by 127.0.0.1