28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

This recipe configures MD5 authentication on the EBGP session to AS 65505. You<br />

simply need to configure an MD5 key in the EBGP group. The peer router in this<br />

EBGP session must have the same key. Because the peer router is in another AS that<br />

is likely under the control of a different administrator or ISP, you need to agree on<br />

the authentication key with the remote administrator beforehand. From the key,<br />

MD5 creates an encoded checksum that is included in all transmitted BGP packets.<br />

The receiving router verifies this checksum before accepting the packet.<br />

You can configure BGP authentication globally, per group, or per peer. It is a good<br />

practice to use per-peer authentication for external peers, with a unique key for each<br />

customer. This prevents the possibility of a single leaked key compromising all customer<br />

peering points.<br />

Another good practice is to change authentication keys periodically, on the order of<br />

every three to six months, to prevent the key from leaking either intentionally or<br />

accidentally.<br />

If your IBGP peer routers are all within your domain and are trusted routers, you can<br />

choose not to enable BGP authentication on them. Otherwise, you should configure<br />

authentication for all IBGP sessions, in the same way as for EBGP sessions, to prevent<br />

any attacks by dropping BGP packets that do not contain the correct authentication<br />

parameters.<br />

When you display the router’s configuration after you have typed the password, you<br />

see only the encrypted form of the password. Someone casually glancing through the<br />

configuration would not see the actual password.<br />

[edit protocols bgp group session-to-AS65505]<br />

aviva@RouterF# show<br />

group session-to-AS65505 {<br />

type external;<br />

description "EBGP to Customer A";<br />

authentication-key "$9$FBDdnApO1RSlKB1dbYgJZApu0hS"; ## SECRET-DATA<br />

peer-as 65505;<br />

neighbor 10.0.31.1 {<br />

...<br />

Looking at the BGP information about the neighbor shows that authentication is<br />

configured:<br />

aviva@RouterF> show bgp neighbor 10.0.31.1<br />

Peer: 10.0.31.1+179 AS 65505 Local: 10.0.31.2+2259 AS 65500<br />

Description: EBGP to Customer A<br />

Type: External State: Established Flags: <br />

Last State: OpenConfirm Last Event: RecvKeepAlive<br />

Last Error: None<br />

Export: [ send-statics ]<br />

Options: <br />

Authentication key is configured<br />

...<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.<br />

Authenticating BGP Peers | 451

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!