An Operational Perspective on BGP Security. Geoff Huston February 2005. Disclaimer.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
This is not a description of the approach taken by any particular service provider in securing their network. It is intended to illustrate the set of trade-offs that are typical in the ISP environment and the current status of securing inter-domain routing in the Internet.
Understand the threat model:
Protecting routing protocols and their operation
Protecting the protocol payload
BGP Route Reflectors
Isolate your network at the edge:
Isolate your customers from each other:
Isolate routing roles within the network: