mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			188 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			188 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| .. _bgp:
 | |
| 
 | |
| BGP
 | |
| ---
 | |
| 
 | |
| :abbr:`BGP (Border Gateway Protocol) is one of the Exterior Gateway Protocols
 | |
| and the de facto standard interdomain routing protocol. The latest BGP version
 | |
| is 4. BGP-4 is described in :rfc:`1771` and updated by :rfc:`4271`. :rfc:`2858`
 | |
| adds multiprotocol support to BGP.
 | |
| 
 | |
| IPv4
 | |
| ^^^^
 | |
| 
 | |
| A simple eBGP configuration:
 | |
| 
 | |
| **Node 1:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols bgp 65534 neighbor 192.168.0.2 ebgp-multihop '2'
 | |
|   set protocols bgp 65534 neighbor 192.168.0.2 remote-as '65535'
 | |
|   set protocols bgp 65534 neighbor 192.168.0.2 update-source '192.168.0.1'
 | |
|   set protocols bgp 65534 address-family ipv4-unicast network '172.16.0.0/16'
 | |
|   set protocols bgp 65534 parameters router-id '192.168.0.1'
 | |
| 
 | |
| **Node 2:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols bgp 65535 neighbor 192.168.0.1 ebgp-multihop '2'
 | |
|   set protocols bgp 65535 neighbor 192.168.0.1 remote-as '65534'
 | |
|   set protocols bgp 65535 neighbor 192.168.0.1 update-source '192.168.0.2'
 | |
|   set protocols bgp 65535 address-family ipv4-unicast network '172.17.0.0/16'
 | |
|   set protocols bgp 65535 parameters router-id '192.168.0.2'
 | |
| 
 | |
| 
 | |
| Don't forget, the CIDR declared in the network statement MUST **exist in your
 | |
| routing table (dynamic or static), the best way to make sure that is true is
 | |
| creating a static route:**
 | |
| 
 | |
| **Node 1:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols static route 172.16.0.0/16 blackhole distance '254'
 | |
| 
 | |
| **Node 2:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols static route 172.17.0.0/16 blackhole distance '254'
 | |
| 
 | |
| 
 | |
| IPv6
 | |
| ^^^^
 | |
| 
 | |
| A simple BGP configuration via IPv6.
 | |
| 
 | |
| **Node 1:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 ebgp-multihop '2'
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 remote-as '65535'
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 update-source '2001:db8::1'
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 address-family ipv6-unicast
 | |
|   set protocols bgp 65534 address-family ipv6-unicast network '2001:db8:1::/48'
 | |
|   set protocols bgp 65534 parameters router-id '10.1.1.1'
 | |
| 
 | |
| **Node 2:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 ebgp-multihop '2'
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 remote-as '65534'
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 update-source '2001:db8::2'
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 address-family ipv6-unicast
 | |
|   set protocols bgp 65535 address-family ipv6-unicast network '2001:db8:2::/48'
 | |
|   set protocols bgp 65535 parameters router-id '10.1.1.2'
 | |
| 
 | |
| Don't forget, the CIDR declared in the network statement **MUST exist in your
 | |
| routing table (dynamic or static), the best way to make sure that is true is
 | |
| creating a static route:**
 | |
| 
 | |
| **Node 1:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols static route6 2001:db8:1::/48 blackhole distance '254'
 | |
| 
 | |
| **Node 2:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols static route6 2001:db8:2::/48 blackhole distance '254'
 | |
| 
 | |
| Route Filter
 | |
| ^^^^^^^^^^^^
 | |
| 
 | |
| Route filter can be applied using a route-map:
 | |
| 
 | |
| **Node1:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set policy prefix-list AS65535-IN rule 10 action 'permit'
 | |
|   set policy prefix-list AS65535-IN rule 10 prefix '172.16.0.0/16'
 | |
|   set policy prefix-list AS65535-OUT rule 10 action 'deny'
 | |
|   set policy prefix-list AS65535-OUT rule 10 prefix '172.16.0.0/16'
 | |
|   set policy prefix-list6 AS65535-IN rule 10 action 'permit'
 | |
|   set policy prefix-list6 AS65535-IN rule 10 prefix '2001:db8:2::/48'
 | |
|   set policy prefix-list6 AS65535-OUT rule 10 action 'deny'
 | |
|   set policy prefix-list6 AS65535-OUT rule 10 prefix '2001:db8:2::/48'
 | |
|   set policy route-map AS65535-IN rule 10 action 'permit'
 | |
|   set policy route-map AS65535-IN rule 10 match ip address prefix-list 'AS65535-IN'
 | |
|   set policy route-map AS65535-IN rule 10 match ipv6 address prefix-list 'AS65535-IN'
 | |
|   set policy route-map AS65535-IN rule 20 action 'deny'
 | |
|   set policy route-map AS65535-OUT rule 10 action 'deny'
 | |
|   set policy route-map AS65535-OUT rule 10 match ip address prefix-list 'AS65535-OUT'
 | |
|   set policy route-map AS65535-OUT rule 10 match ipv6 address prefix-list 'AS65535-OUT'
 | |
|   set policy route-map AS65535-OUT rule 20 action 'permit'
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 route-map export 'AS65535-OUT'
 | |
|   set protocols bgp 65534 neighbor 2001:db8::2 route-map import 'AS65535-IN'
 | |
| 
 | |
| **Node2:**
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set policy prefix-list AS65534-IN rule 10 action 'permit'
 | |
|   set policy prefix-list AS65534-IN rule 10 prefix '172.17.0.0/16'
 | |
|   set policy prefix-list AS65534-OUT rule 10 action 'deny'
 | |
|   set policy prefix-list AS65534-OUT rule 10 prefix '172.17.0.0/16'
 | |
|   set policy prefix-list6 AS65534-IN rule 10 action 'permit'
 | |
|   set policy prefix-list6 AS65534-IN rule 10 prefix '2001:db8:1::/48'
 | |
|   set policy prefix-list6 AS65534-OUT rule 10 action 'deny'
 | |
|   set policy prefix-list6 AS65534-OUT rule 10 prefix '2001:db8:1::/48'
 | |
|   set policy route-map AS65534-IN rule 10 action 'permit'
 | |
|   set policy route-map AS65534-IN rule 10 match ip address prefix-list 'AS65534-IN'
 | |
|   set policy route-map AS65534-IN rule 10 match ipv6 address prefix-list 'AS65534-IN'
 | |
|   set policy route-map AS65534-IN rule 20 action 'deny'
 | |
|   set policy route-map AS65534-OUT rule 10 action 'deny'
 | |
|   set policy route-map AS65534-OUT rule 10 match ip address prefix-list 'AS65534-OUT'
 | |
|   set policy route-map AS65534-OUT rule 10 match ipv6 address prefix-list 'AS65534-OUT'
 | |
|   set policy route-map AS65534-OUT rule 20 action 'permit'
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 route-map export 'AS65534-OUT'
 | |
|   set protocols bgp 65535 neighbor 2001:db8::1 route-map import 'AS65534-IN'
 | |
| 
 | |
| We could expand on this and also deny link local and multicast in the rule 20
 | |
| action deny.
 | |
| 
 | |
| RPKI
 | |
| ^^^^
 | |
| 
 | |
| :abbr:`RPKI (Resource Public Key Infrastructure)` is a framework :abbr:`PKI (Public Key Infastucrure)`
 | |
| designed to secure the Internet routing insfratructure.
 | |
| It associate a BGP route announcement with the correct originating :abbr:`ASN (Autonomus System Number)` and check it validation.
 | |
| RPKI described in :rfc:`6480`. This is a separate server. You can find more details at RIPE-NNC_.
 | |
| 
 | |
| Imported prefixes during the validation may have values: valid, invalid and notfound.
 | |
| 
 | |
| * The valid state means that prefix and ASN that originated it match the :abbr:`ROA (Route Origination Authorizations)` base.
 | |
| * Invalid means that prefix/prefix length and ASN that originated it doesn't match with ROA.
 | |
| * Notfound means that prefix not found in ROA.
 | |
| 
 | |
| We can build route-maps for import, based on these states.
 | |
| Simple RPKI configuration, where 'routinator' - RPKI cache server with ip '10.11.11.1'.
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set protocols rpki cache routinator address '10.11.11.1'
 | |
|   set protocols rpki cache routinator port '3323'
 | |
| 
 | |
| Example route-map for import. We can set local-preference logic based on states.
 | |
| Also we may not import prefixes with the state 'invalid'.
 | |
| 
 | |
| .. code-block:: none
 | |
| 
 | |
|   set policy route-map ROUTES-IN rule 10 action 'permit'
 | |
|   set policy route-map ROUTES-IN rule 10 match rpki 'valid'
 | |
|   set policy route-map ROUTES-IN rule 10 set local-preference '300'
 | |
|   set policy route-map ROUTES-IN rule 20 action 'permit'
 | |
|   set policy route-map ROUTES-IN rule 20 match rpki 'notfound'
 | |
|   set policy route-map ROUTES-IN rule 20 set local-preference '125'
 | |
|   set policy route-map ROUTES-IN rule 30 action 'deny'
 | |
|   set policy route-map ROUTES-IN rule 30 match rpki 'invalid'
 | |
| 
 | |
| .. _RIPE-NNC: https://github.com/RIPE-NCC/rpki-validator-3/wiki
 |