peering-toolbox:single_upstream_private_peer
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
peering-toolbox:single_upstream_private_peer [2022/05/13 07:29] – [ROA and Route Object] philip | peering-toolbox:single_upstream_private_peer [2022/08/26 09:55] (current) – [ROA and Route Object] philip | ||
---|---|---|---|
Line 3: | Line 3: | ||
====== Single Upstream & Private Peer ====== | ====== Single Upstream & Private Peer ====== | ||
- | Most network operators first encounter with peering is when they have a simple connection to their upstream provider. This connection usually involves the operator having a static default route configured on the link to the upstream, with the upstream pointing a default | + | Most network operators first encounter with peering is when they have a simple connection to their upstream provider. This connection usually involves the operator having a static default route configured on the link to the upstream, with the upstream pointing a simple |
We will now look at how we go about adding a peering with another network. There are two possible cases here: | We will now look at how we go about adding a peering with another network. There are two possible cases here: | ||
Line 10: | Line 10: | ||
- [[single_upstream_private_peer# | - [[single_upstream_private_peer# | ||
+ | A diagram showing the typical physical layout of this scenario is shown below: | ||
+ | |||
+ | {{: | ||
===== Enabling the Peer ===== | ===== Enabling the Peer ===== | ||
==== Deploying Address Space ==== | ==== Deploying Address Space ==== | ||
- | If we are not already using our own address space, then we need to consider first how to go about deploying it across | + | If the newcomer is not already using their own address space from when they first set up their service, then they need to consider first how to go about deploying it across |
- | We already have obtained | + | The newcomer will already have obtained |
- | - Create a Route Object for your address space using your upstream provider' | + | - Create a Route Object for the address space using the upstream provider' |
- | - Create another Route Object for your address space using your own ASN | + | - Create another Route Object for the address space using the acquired |
- | - Create a ROA for your address space using your upstream provider' | + | - Create a ROA for the address space using the upstream provider' |
- | - Create another ROA for your address space using your own ASN | + | - Create another ROA for the address space using the acquired |
- | - Provide a Letter of Authority | + | - Provide a [[single_upstream# |
- | - Organise with the upstream (transit provider) for the address space to be announced globally and routed | + | - Organise with the upstream (transit provider) for the address space to be announced globally and routed |
- Renumber the network (change dynamic pools, and use secondary addressing if needed) | - Renumber the network (change dynamic pools, and use secondary addressing if needed) | ||
- Withdraw the old address space | - Withdraw the old address space | ||
Line 29: | Line 32: | ||
==== Deploying IBGP ==== | ==== Deploying IBGP ==== | ||
- | Once our own address space is in use for the network, BGP needs to deployed internally (IBGP) across the network (at least for the devices in the core and border of the network). If the network | + | Once the newcomer' |
- | There are many online guides on how to deploy IBGP so will not be covered here. The assumption is that an interior routing protocol like OSPF or ISIS is already operating - if it is not, then this will also need to be deployed before IBGP can be deployed. The AS number that BGP requires is the one already obtained from the Regional Internet Registry. | + | There are many online guides on how to deploy IBGP so the process |
==== Deploying EBGP with Peer ==== | ==== Deploying EBGP with Peer ==== | ||
Line 48: | Line 51: | ||
===== BGP with Upstream ===== | ===== BGP with Upstream ===== | ||
- | Here we go one step further. | + | Here we go one step further |
- | The address space still needs to be deployed, IBGP needs to be set up across the backbone, and EBGP needs to be set up with the peer. These three steps were described in the [[next-steps# | + | The address space still needs to be deployed, IBGP needs to be set up across the backbone, and EBGP needs to be set up with the peer. These three steps were described in the [[single_upstream_private_peer# |
Enabling EBGP with the upstream will now make the network operator' | Enabling EBGP with the upstream will now make the network operator' | ||
Line 60: | Line 63: | ||
==== Letter of Authority ==== | ==== Letter of Authority ==== | ||
- | The next step is to provide them with a Letter of Authority (if required) which requests their upstreams and peers to allow your address space originated by your ASN. | + | The next step is to provide them with a [[single_upstream# |
- | LOAs are not usually required as a ROA should be enough to prove the holder of the address space and the origin ASN. But some operators insist on the LOA, still. | + | LOAs are not usually required as a ROA is enough to prove the holder of the address space and the origin ASN. But some operators |
==== ROA and Route Object ==== | ==== ROA and Route Object ==== | ||
- | Confirm that the ROA (and Route Object) with your ASN as the origin of your address space is still present in your RIR's database. Note that if you are migrating from a static set up, do **NOT** delete the existing ROA (or Route Object) that declares their ASN as the origin - you still need it for now. | + | Confirm that the [[peering-toolbox/ |
- | === BGP Policy Configuration === | + | ==== BGP Policy Configuration |
Then you need to create two policy statements, one for incoming policy, the other for outgoing policy. The incoming policy statement will likely say that you'll only accept a default route. Most operators will either: | Then you need to create two policy statements, one for incoming policy, the other for outgoing policy. The incoming policy statement will likely say that you'll only accept a default route. Most operators will either: | ||
Line 86: | Line 89: | ||
And during their maintenance window, they can remove the static route for your address space pointing to you. Note that when they do this, they will stop originating your address space from their AS. Which means that the announcement you make to them from your ASN will become globally visible. This change needs to be done once everyone is sure, and the upstream has confirmed, that all their upstreams and peers have updated BGP filters accordingly. It is best that this latter work is all carried out during a maintenance window, and preferably at least 24 to 48 hours after bringing up the EBGP session, to avoid unexpected outages. | And during their maintenance window, they can remove the static route for your address space pointing to you. Note that when they do this, they will stop originating your address space from their AS. Which means that the announcement you make to them from your ASN will become globally visible. This change needs to be done once everyone is sure, and the upstream has confirmed, that all their upstreams and peers have updated BGP filters accordingly. It is best that this latter work is all carried out during a maintenance window, and preferably at least 24 to 48 hours after bringing up the EBGP session, to avoid unexpected outages. | ||
+ | |||
+ | ==== Clean up ==== | ||
+ | |||
+ | With EBGP running successfully with the upstream provider, and the address space visible globally (check on [[http:// | ||
+ | |||
+ | The Route Object and ROA created with the upstream provider' | ||
+ | |||
[[: | [[: |
peering-toolbox/single_upstream_private_peer.1652426986.txt.gz · Last modified: by philip