Print

Print


SDN Supports the filtering.  The AS and the

- reject 0/0
 - reject RFC1918
 - reject bogon ASNs
 - reject /25 - /32's

Keep it as clean as possible.  We only want member routes nothing else.

[log in to unmask] <[log in to unmask]>
2900 W. 10th St. | Sioux Falls, SD 57104
(w) 605.978.3558  | (c) 605.359-3737 | (tf) 800.247.1442
SDN NOC 877.287.8023
NOC Support email: [log in to unmask] <[log in to unmask]>

"Be Excellent to Each Other"

-----Original Message-----
From: MICE Discuss [mailto:[log in to unmask]] On Behalf Of Andrew Hoyos
Sent: Friday, December 2, 2016 9:08 AM
To: [log in to unmask]
Subject: Re: [MICE-DISCUSS] Route Server Filtering

On Dec 1, 2016, at 8:32 PM, Richard Laager <[log in to unmask]> wrote:
>
> I'm looking for feedback on a filtering proposal. I propose that, on
> the route server, by default, we filter incoming routes to block
> anything
> matching:
> _(174|209|286|701|1239|1299|2828|2914|3257|3320|3356|3549|5511|6453|64
> 61|6762|6939|7018|12956)_

I fully support this.
Also would suggest blocking bogon ASNs on the route servers too (good list/examples in Job's presentation as well)

For those doing bilateral peering, I'd also highly suggest applying sane import filters on peers to catch folks that aren't behaving properly. We do something like:

 - reject 0/0
 - reject RFC1918
 - reject bogon ASNs
 - reject /25 - /32's

--
Andrew Hoyos
[log in to unmask]

________________________________

***This message and any attachments are solely for the intended recipient. If you are not the intended recipient, disclosure, copying, use or distribution of the information included in this message is prohibited -- Please immediately and permanently delete.***