^ Top

NANOG Meeting Presentation Abstract

Tutorial: BGP Multihoming Techniques
Meeting: NANOG28
Date / Time: 2003-06-01 1:30pm - 3:00pm
Room: Granary
Presenters: Speakers:

Philip Smith, Cisco Systems

Philip Smith joined Cisco Systems in January 1998. He is a member of the Service Provider Architectures Group of Consulting Engineering, within Corporate Development. His role includes working with many ISPs in the Asia-Pacific region and the rest of the world, specifically in network strategies, design, technology, and operations, as well as helping with network configuration and scaling. Other areas of interest also include Internet routing, Internet protocols, IPv6, and encouraging the growth of the Internet around the world. Prior to joining Cisco, he spent 5 years at PIPEX (now part of UUNET\'s global ISP business), the UK\'s first commercial Internet Service Provider. He was one of the first engineers working in the UK Internet, and played a fundamental role in building the modern Internet in the UK and Europe. Philip is co-author of Cisco ISP Essentials, ISBN 1-58705-041-2, published by Cisco Press. He holds a Doctor of Philosophy and has a First Class Honours Degree in Physics. He lives in Brisbane, Australia.
Abstract: This tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. This includes the options available when multihoming to the same ISP (including RFC2270) and to different upstreams. Configurations for modifying inbound and outbound traffic flows are covered. The tutorial concludes with a case study, and an examination of the use of BGP communities by several ISPs. The configuration examples throughout this tutorial use the Cisco IOS configuration syntax.
Files: mp4BGP Multihoming Techniques(MP4)
pdfPhilip Smith Presentation(PDF)
Sponsors: None.
Tutorial: Deploying Interdomain IP Multicast
Meeting: NANOG28
Date / Time: 2003-06-01 1:30pm - 3:00pm
Room: Harvest
Presenters: Speakers:

Mike McBride, Cisco Systems

Mike is a SW Engineer in the Multicast Development group at Cisco Systems. His focus is the deployment of Multicast in the Service Provider space.
Abstract: This session covers the protocols and topologies associated with inter-domain multicast routing, including details on the operation of MSDP and MBGP as they relate to PIM. The session also introduces the latest trends in inter-domain multicast routing, PIM Source Specific Multicast (SSM), Multicast VPNs, and IPv6 Multicast. During the tutorial, the basic fundamentals of MBGP and MSDP are covered along with their basic configuration, as well as the use of Anycast RP\'s. Numerous topology examples with regard to inter-domain multicast using MBGP and MSDP are presented, along with configuration examples for both the provider and customers. Next, the session introduces Source Specific Multicast and shows how this method of inter-domain multicast solves some of the problems associated with traditional inter-domain PIM-SM multicast. Methods to secure a multicast network will also be presented.
Files: mp4Deploying Interdomain IP Multicast(MP4)
pptMike McBride Presentation(PPT)
Sponsors: None.
Tutorial: Introduction to MPLS
Meeting: NANOG28
Date / Time: 2003-06-01 3:30pm - 5:00pm
Room: Harvest
Presenters: Speakers:

Joe Soricelli, Juniper

Joseph M. Soricelli is an Education Services Engineer at Juniper. He is a Juniper Networks Certified Internet Engineer, a Juniper Authorized Instructor, and a Cisco Certified Internet Expert. Joeseph is a contributing author to <I>Juniper Networks Routers: The Complete Reference</I> and <I>Juniper Networks Certified Internet Associate Study Guide</I>. In addition to writing numerous training courses, he has worked with and trained carriers, telcos, and ISPs throughout his career in the networking industry.
Abstract: This tutorial introduces network engineers and service providers to basic and intermediate features and techniques available for building an MPLS network. We will discuss basic topics of how MPLS operates in a service provider network, including terminology, the setup of label-switched paths (LSPs), and LSP maintenance. Both dynamic MPLS signaling options in widespread use today, RSVP and LDP, will be discussed. Throughout the tutorial, Juniper Networks and Cisco Systems routers are used to illustrate important MPLS concepts. Additionally, configuration and troubleshooting examples are provided using CLI commands from both vendors.
Files: mp4Introduction to MPLS(MP4)
pdfJoe Soricelli Presentation(PDF)
Sponsors: None.
Interception Technology: The Good, The Bad, and The Ugly!
Meeting: NANOG28
Date / Time: 2003-06-02 9:15am - 10:15am
Room: Seasons Ballroom
Presenters: Speakers:

Jeff Schiller, MIT

Jeff Schiller received his S.B. in Electrical Engineering from MIT in 1979. As MIT Network Manager, he has overseen the MIT Campus Computer Network since its inception in 1984. Prior to his work in the Network Group, he maintained MIT\'s Multics timesharing system during the ARPANet TCP/IP conversion. Jeff is an author of MIT\'s Kerberos Authentication system. From 1994 through 2003, he was the Internet Engineering Steering Group\'s Area Director for Security, responsible for overseeing security-related Working Groups of the IETF. He was responsible for releasing a U.S. legal freeware version of the popular PGP encryption program. Jeff is also responsible for the development and deployment of an X.509-based Public Key Infrastructure at MIT. He is the technical lead for the new Higher Education Certifying Authority being operated by the Corporation for Research and Educational Networking, and a founding member of the Steering Group of NEARnet, now part of Level3.
Abstract: There is a conflict between the interests of privacy and the ability of law enforcement to intercept the communications of criminal targets. Yet interception technology is not without its own risks -- it is intended to be used only by authorized parties for lawful interception, but may also be abused by unauthorized individuals. This talk will focus on the technical risks of interception technology and discuss the wisdom of standardizing protocols and technologies to facilitate interception. This is a tricky topic, because one must balance the benefits and risks of privacy versus interception for lawful purposes. We will attempt to stay within the technical realm as opposed to the politics of interception.
Files: mp4Interception Technology 1(MP4)
mp4Interception Technology 2(MP4)
mp4Interception Technology 3(MP4)
pdfJeff Schiller Presentation(PDF)
Sponsors: None.
The National Infrastructure Assurance Council (NIAC) Vulnerability Disclosure Framework and What It Might Mean to the ISP Community
Meeting: NANOG28
Date / Time: 2003-06-02 10:45am - 11:00am
Room: Seasons Ballroom
Presenters: Speakers:

Jim Duncan, Cisco Systems

Jim Duncan works in the Critical Infrastructure Assurance Group at Cisco Systems, where he is a topic expert on incident response, vulnerability handling, and cyberthreat assessment. Previously, Jim was an Incident Manager for the Cisco Systems Product Security Incident Response Team (PSIRT) for four years, where he handled customer security and product security vulnerabilities. In addition to his work with the NIAC Vulnerability Disclosure WG, Jim currently works on proactive issues supporting other incident response teams within Cisco. He is authoring an internal policy for information sharing, and he actively contributes to external projects for several Information Sharing and Analysis Centers (ISACs). In the background is a project to adapt \"Inter-NOC Dial By ASN\" technology for inter-ISAC communications. Jim contributed to RFC 1244, the Site Security Policy Handbook, co-authored a tutorial on building an incident response team for USENIX, and is a Liaison Member of the Forum of Incident Response and Security Teams. Prior to Cisco, Jim worked for Penn State University. He attended his first NANOG meeting at NANOG8, October 1996, in Ann Arbor.
Paul Vixie, ISC.
Abstract: The National Information Advisory Council (NIAC) was formed by executive order in September 2002 and is charged with advising the US Department of Homeland Security and the President regarding the security of information systems and networks essential to the nation\'s critical infrastructure. A key task in front of the NIAC is to provide guidance on disclosing vulnerabilities, and a working group has been created to establish a framework for vulnerability disclosure to include specific recommendations to the President. As part of its outreach and information-gathering efforts, the working group is presenting a brief overview of the project during the Monday morning General Session. Interested attendees are invited to contribute further via a dialog during the ISP Security BOF at 7:30 Monday evening.
Files: pdfJim Duncan Presentation(PDF)
mp4The NIAC Vulnerability Disclosure Framework(MP4)
Sponsors: None.
IPv4/IPv6 Dual-Stack on Abilene
Meeting: NANOG28
Date / Time: 2003-06-02 11:00am - 11:20am
Room: Seasons Ballroom
Presenters: Speakers:

Grover Browning, Indiana University

Grover Browning is a senior engineer with the Global Research NOC at Indiana University. The NOC handles network operations services for Abilene, StarTap, AMPath, and a variety of other research and education networks.
Abstract: Abilene, the Internet2 backbone, has been running dual-stack on its backbone routers for over a year. In this talk, we discuss experiences with both the Cisco GSR and Juniper T640 platforms on issues ranging from IGP and BGP to monitoring and performance.
Files: pdfGrover Browning Presentation(PDF)
mp4IPv4/IPv6 Dual-Stack on Abilene(MP4)
Sponsors: None.
Research Forum: Inter-provider Coordination for Real-Time Tracebacks
Meeting: NANOG28
Date / Time: 2003-06-02 11:20am - 12:00pm
Room: Seasons Ballroom
Presenters: Speakers:

Kathleen M. Moriarty, MIT

Kathleen Moriarty is the lead Network Security Engineer at MIT Lincoln Laboratory, responsible for overseeing the protection and monitoring of the Laboratory\'s networks and computer systems. She also has experience working as a network and security engineer in both the ISP and financial sectors through previous positions and consulting work. In the financial sector, she previously held the position of Director of Information Security at FactSet Research Systems. Kathleen holds a Masters of Science degree in Computer Science from Rensselaer Polytechnic Institute and a Bachelor of Science in Mathematics and Computer Science from Siena College.
Abstract: In the face of security incidents, network providers need to be equipped and ready to assist in tracing traffic flows across provider boundaries to their source. The Real-time Inter-network Defense described in internet-drafts/draft-moriarty-ddos-rid-03.txt is a proposed method to facilitate communication between networks. This approach allows for a variety of methods, existing or future, to be used to trace the packets within a given network domain. Standardization of inter-provider coordination by leveraging existing relationships between operators allows proper feedback and makes it possible for status information for the request to be communicated in a flexible manner. The results of a small-scale test of the system will be presented. Next steps would include an experiment to test the system at the ISP level, determining the integration necessary for inter-provider coordination and determining its effectiveness for tracebacks.
Files: mp4Inter-Provider Coordination for Real-Time Tracebacks(MP4)
pdfKathleen Moriarty Presentation(PDF)
Sponsors: None.
Research Forum: Achieving Record Speed Trans-Atlantic End-to-end TCP Throughput
Meeting: NANOG28
Date / Time: 2003-06-02 11:20am - 12:00pm
Room: Seasons Ballroom
Presenters: Speakers:
Les Cottrell, Stanford University.
Abstract: In November 2002 and again in February 2003, an international team of scientists from Caltech, SLAC, and LANL in the U.S., CERN in Switzerland, and NIKHEF in Amsterdam broke the Internet2 TCP land speed record (i.e., the product of the bits/s times the distance) not once but twice. They achieved 923Mbits/s with an end-to-end application-to-application single TCP stream from Amsterdam to Sunnyvale (10,619 Tbit-meters/s) over a 1Gbit/s bottleneck, 8.6 Gbits/s between 10 machines in Sunnyvale and 10 machines in Baltimore over a 10 Gbits/s bottleneck, and 2.38 Gbits/s with a single TCP stream from Sunnyvale to Geneva over a 2.5 Gbits/s bottleneck. The records were broken with commercial off-the-shelf components, and demonstrate that TCP can scale from the original 56kbits/s Internet of the 1980s to tomorrow\'s multi Gbits/s rates. The talk will address the questions of: who did it; what exactly was done; how was it done (including descriptions of the testbeds, the challenges, the effects of various solutions, and gotchas); what was special about this; why it is important; and what\'s next?
Files: mp4Achieving Record Speed Trans-Atlantic End-to-end TCP Throughput(MP4)
pdfLes Cottrell Presentation(PDF)
Sponsors: None.
Tutorial: ISP Security: Deploying and Using Sinkholes
Meeting: NANOG28
Date / Time: 2003-06-02 3:30pm - 5:00pm
Room: Seasons Ballroon
Presenters: Speakers:
Barry Raveendren Greene, Cisco Systems.
Danny McPherson, Arbor Networks.
Abstract: Sinkholes are a flexible security tool that add a wealth of new capabilities to an ISP\'s security toolkit. ISPs are using sinkholes to track infrastructure port scanning, identify and classify attacks, packet capture attack flows, trace attacks through their networks, and divert attack flows from the target of the attacks. Sinkholes also enable a variety of new applications brought about through necessity and growing operational experience. Sinkholes go beyond narrowly focused tools like black hole servers, Tarpits, and Honeynets. Sinkholes may be used to perform any or all of these functions, but often incorporate all of these and more. This tutorial will explain how to build a sinkhole, using generalized examples from ISP deployments around the world. Configuration using JUNOS and IOS will be used to demonstrate the various ways trigger routers and target routers in the sinkholes are safely, scalably, and efficiently configured. Architectural considerations relating to network topology and placement of sinkholes in the ISP\'s network will be covered, along with anycast deployment options. A multitude of tools that can be placed inside the sinkhole will also be discussed. These include a variety of freeware, shareware, home-built, and commercial tools - covering the diversity available to ISPs of any size. This tutorial is recommended to ISP engineers of all experience levels. The source materials are derived from live operational deployments, which can be modified and applied to any large IP transport network.
Files: pdfISP Security: Deploying and Using Sinkholes(PDF)
mp4ISP Security: Deploying and Using Sinkholes(MP4)
Sponsors: None.
Issues in IPv6 Deployment
Meeting: NANOG28
Date / Time: 2003-06-02 3:30pm - 5:00pm
Room: Harvest Room
Presenters: Speakers:

Jeff Doyle, Juniper

Jeff Doyle is the IPv6 Solutions Manager for Juniper Networks. Specializing in IP routing protocols, MPLS, and IPv6, Jeff has designed or assisted in the design of large-scale IP service provider networks throughout North America, Europe, Japan, Korea, and the People\'s Republic of China. Jeff is the author of <I>CCIE Professional Development: Routing TCP/IP, Volumes I and II</I>, is an editor and contributing author of <I>Juniper Networks Routers: The Complete Reference</I>, and is the author of a new series of books on large-scale networking, the first of which will be released in the summer of 2003. Jeff has presented numerous corporate seminars for Juniper Networks, and has also spoken at NANOG, JANOG, APRICOT, and at IPv6 Forum conferences.
Abstract: Although IPv6 has been deployed in a multitude of research and development networks worldwide, commercial deployment is still limited. The need for IPv6 is widely acknowledged in Asia, where IPv4 addresses are increasingly difficult to acquire. In North America, where some 74% of the allocated IPv4 addresses are located, there is not yet the sense of urgency for IPv6 as there is in Asia. Yet even here, there is growing interest and understanding IPv6 will eventually be required. It is therefore important that network operators begin familiarizing themselves with the technical issues surrounding the deployment of realistic IPv6 networks. This tutorial provides a technical overview of the existing state of the three classes of IPv6 transition technologies: dual stacks, tunnels, and translators. Specific technologies within each of these classes are examined. Outstanding transition issues, both resolved and unresolved, are also examined. These issues include multihoming, DNS, and security.
Files: mp4Issues in IPv6 Deployment(MP4)
pptJeff Doyle Presentation(PPT)
Sponsors: None.
XML-based Network Management Tools
Meeting: NANOG28
Date / Time: 2003-06-02 7:30pm - 9:00pm
Room: Harvest
Presenters: Moderators:

Rob Enns, Juniper

Rob Enns is a Director of Software Engineering at Juniper Networks. Prior to Juniper he worked at Berkeley Networks, FORE Systems, and Bell-Northern Research.
Abstract: XML for network management has been a popular topic lately. The large toolset available for manipulating XML encoded data, the text-based nature of the data, and the natural applicability to encoding large sets of hierarchical data make XML a good choice for manipulating data representing network configuration and operational state. This BoF will present several examples of XML-based network management tools. Examples will include tools currently in production use at major ISPs, as well as examples of vendor-specific XML tools such as JUNOScript.
Files: pdfRob Enns Presentation(PDF)
Sponsors: None.
@Home Cable Backbone Deployment Experiences
Meeting: NANOG28
Date / Time: 2003-06-03 9:00am - 9:30am
Room: Seasons Ballroon
Presenters: Speakers:
Cathy Wittbrodt, None.
Abstract: This presentation outlines some of the technical concerns and other issues that came up during deployment of the @Home Network.
Files: pdfCathy Wittbrodt Presentation(PDF)
Sponsors: None.
Bidirectional Forwarding Plane Deadness Detection
Meeting: NANOG28
Date / Time: 2003-06-03 9:30am - 10:15am
Room: Seasons Ballroon
Presenters: Speakers:
Dave Ward, Cisco Systems.
Dave Katz, Juniper Networks.
Abstract: This presentation will describe a technology intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and, to the extent possible, the forwarding engines themselves, with potentially very low latency. The technology operates independently of media, data protocols, and routing protocols. We will also discuss scenarios of applicability and deployment.
Files: mp4Bidirectional Forwarding Plane Deadness Detection(MP4)
pdfDave Ward Presentation(PDF)
Sponsors: None.
BGP Vulnerability Testing: Separating Fact from FUD
Meeting: NANOG28
Date / Time: 2003-06-03 1:30pm - 2:00pm
Room: Seasons Ballroon
Presenters: Speakers:

Sean Convery, Cisco Systems

Sean Convery is a security researcher in Cisco\'s Critical Infrastructure Assurance Group (CIAG). The research arm of the CIAG is tasked to collaborate with various groups on security issues 3-5 years in the future. Before coming to the CIAG, Sean worked primarily on the SAFE blueprint, and is an author of several whitepapers on the subject. Prior to his five years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking.

Matthew Franz, Cisco Systems

Matthew Franz is a security researcher in Cisco Systems\' Critical Infrastructure Assurance Group in Austin, Texas. Apart from work on BGP, interests include industrial automation (SCADA/DCS/Industrial Ethernet), security, and automated protocol test tools. Before joining CIAG, Matthew was senior security engineer in the Security Technologies Assessment team, where he conducted product security evaluations on a variety of Cisco products and network protocols. Before coming to Cisco in 2000, Matthew was a network security consultant and taught technical network security courses to government information warfare customers in San Antonio, Texas.
Abstract: Recently the security of BGP has been called into question by the government, security experts, and the media. Perhaps by assuming that a compromise of the Internet routing infrastructure would be relatively trivial to accomplish, most of the recent attention has focused on replacements to BGP rather than ways we can do the best with what we have. Because any possible replacement for BGP will not be widely deployed in the near-term, an understanding of the key threats and mitigation techniques against current BGP deployments needs to be better understood. Furthermore, since most of the existing work related to BGP vulnerabilities is largely theoretical in nature, any new effort should be based in real testing on implementations that are commonly deployed by ISPs. This talk presents the results of research in the area of BGP attacks. This research includes three main areas. First, specific attacks as outlined in the BGP Attack Tree draft were tested against lab networks to gauge attack results, difficulty, and the availability of best practices which mitigate the attack\'s effects. Where appropriate, these attacks were done against multiple BGP implementations to measure variations in response. Second, multiple implementations were tested using a BGP malformed message generator in an attempt to measure the resilience of BGP implementations against unexpected input. Third, the prevalence of generally accepted best practices on the Internet was measured by querying a representative set of the Internet\'s BGP routers on key management interfaces. Analysis of this data will be useful for operators looking to improve the security of their BGP networks today and to evaluate potential improvements to BGP in the future, especially given the challenge of balancing scalability and ease of deployment with security in any future \"secure BGP.\"
Files: mp4BGP Vulnerability Testing(MP4)
pdfRevised PDF presentation(PDF)
Sponsors: None.
NRIC Best Practices for ISP Security
Meeting: NANOG28
Date / Time: 2003-06-03 2:15pm - 2:45pm
Room: Seasons Ballroon
Presenters: Speakers:

Ross Callon, Juniper

Ross Callon is an engineer in the protocols group at Juniper Networks. He has experience in Internet protocol standards, high-speed router design, and multi-protocol coexistence and interoperability. Ross is co-chair of Network Reliability and Interoperability Council 6, Focus Group 2, advising the FCC on network reliability. He also was a participant in a recent effort to advise the White House on security in communications networks. Ross is a long-standing participant in multiple IETF working groups, and has previous experience in the ATM Forum, IESG, IEEE, ANSI, and ISO. He has authored or contributed toward VPN, MPLS, PNNI, IPv6, IS-IS and CLNP networking standards. He is a former co-chair of the IETF IP Next Generation (IPv6) working group. Ross has published numerous articles and been awarded twelve patents. He holds a B.S. in Mathematics from MIT and an M.S. in Operations Research from Stanford University.
Abstract: The increasing economic importance of IP networking, combined with a sharp increase in the frequency and sophistication of attacks, has made security of critical importance for IP data networks. In response to this need, a group of service providers and vendors, operating as part of the Network Reliability and Interoperability Council (NRIC), has developed a set of best practices for enhancing data network security. This talk will give a short overview of NRIC and of the best practices for security. We will give an example of how best practices can be useful in stopping attacks such as the slammer/sapphire worm, and will provider pointers to more information on NRIC and the NRIC best practices for security.
Files: mp4NRIC Best Practices for ISP Security(MP4)
pdfRoss Callon Presentation(PDF)
Sponsors: None.
Implementation of ARIN\'s Lame DNS Delegation Policy
Meeting: NANOG28
Date / Time: 2003-06-03 3:00pm - 3:30pm
Room: Seasons Ballroon
Presenters: Speakers:

Ed Lewis, ARIN

Edward Lewis is the Research Engineer for ARIN. He has been involved in DNS and DNSSEC Working Groups in the IETF since 1996 and is one co-chair of the Provisioning Registry Protocol Working Group of the IETF.
Abstract: The members of ARIN instituted a policy to curb lame DNS delegations within ARIN\'s scope in the in-addr.arpa domain. The staff of ARIN has begun implementing the policy and has already witnessed a reduction in lame delegations. This presentation will outline the ARIN policy, results from early tests, and explain how ARIN is interacting with registrants and other registries on this issue.
Files: pptEd Lewis Presentation(PPT)
mp4Implementation of ARIN's Lame DNS Delegation Policy(MP4)
Sponsors: None.
MPLS-Based Synchronous Traffic Shunt
Meeting: NANOG28
Date / Time: 2003-06-03 3:30pm - 4:00pm
Room: Seasons Ballroon
Presenters: Speakers:

Yehuda Afek, Riverhead

Yehuda Afek is a Professor in the School of Computer Science at Tel-Aviv University, and the CTO of Riverhead Networks Inc. Currently his research focuses on efficient forwarding and routing algorithms for IP networks, and methods for traffic engineering to stop DDoS attacks. Prior to joining Tel-Aviv University in 1989 he spent four years in AT&T Bell Laboratories. He received his M.Sc. and Ph.D. in Computer Science from UCLA in 1985 and 1983, respectively.
Roy Brooks, Cisco Systems.

Nicolas Fischbach, COLT Telecom

Nicolas Fischbach is a Senior Manager, responsible for the European IP Security Engineering team at COLT Telecom. He also manages the Swiss IP Engineering team, and after participating in the deployment of the Swiss IP network and Internet Solution Center, he helped create the security and network unit of the Professional Services department. He holds an Engineer degree in Networking and Distributed Computing. Nicolas is also co-founder of Sécurité.Org, a French-speaking portal on computer and network security.
Abstract: We present various MPLS-based methods to enable a service provider to divert traffic of specific destinations to a centralized scrubbing and inspection facility. The traffic may be diverted from several locations, such as peering points, to the central processing facility. This technique differs from the sinkhole approach, in which the traffic does not come out of the sink and thus does not reach the intended destination. Here, after being processed, the traffic is sent back to the network on its way to the intended destination. This facilitates scalable, focused, and targeted filtering and processing of different customer traffic for on demand tasks such as, reverse proxy (ala Hardie & Wessels, see Bellwether - Surrogate Services for Popular Content,\" NANOG19), traffic examination, or DDoS attack filtering. The experience of a successful real-life deployment in an ISP environment will be reviewed.
Files: mp4MPLS-Based Synchronous Traffic Shunt(MP4)
pptYehuda Afek Presentation(PPT)
Sponsors: None.
BGP AS Number Exhaustion
Meeting: NANOG28
Date / Time: 2003-06-03 3:30pm - 4:00pm
Room: Seasons Ballroon
Presenters: Speakers:
Geoff Huston, Telstra, author.
K Claffy, CAIDA.
Abstract: The 16-bit AS number field in BGP has 64,510 available values to use in the Internet\'s public routing space. Since some 30,000 AS numbers have already been assigned by the regional registries, the BGP protocol field will be exhausted at some point in the future. The solution, as outlined in www.merit.edu/internet/documents/internet-drafts/draft-ietf-idr-as4bytes-06.txt, is to use a 32-bit field for this value. Both the problem and the solution are discussed further in this presentation.
Files: mp4BGP AS Number Exhaustion(MP4)
pdfGeoff Huston Presentation(PDF)
Sponsors: None.

Back to NANOG28 agenda.

NANOG28 Abstracts

 

^ Back to Top