SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
BMP: the pa amb tomàquet that
your BGP monitoring was missing
Paolo Lucente
Principal Network Tools Engineer
Global IP Network Division at NTT Ltd
02 July 2021 - CATNIX Technical Commission Meeting
Global IP Network | AS2914
whoami
Paolo Lucente
paololucente
plucente
@Paolo_Lucente
Global IP Network | AS2914
BGP
(The) control-plane protocol to advertise
Reachability Information
Global IP Network | AS2914
Why monitoring BGP?
• To verify correct functioning of control-plane
• To correlate control-plane data to:
o Material aspects, ie. reliability of pipes or volumes of traffic
o Business aspects, ie. cost of traffic trajectories, adherence to SLAs
• To contribute enablement of closed-loop operations
Global IP Network | AS2914
What is the main feature of BGP?
Massive scale.
So massive that BGP is the control-plane protocol that governs exchange of
Reachability Information on the global Internet.
Global IP Network | AS2914
Wow!
How does BGP achieve massive scale?
Global IP Network | AS2914
Credits to: Gary Bernhardt @ CodeMash 2012
Global IP Network | AS2914
Wow!
How does BGP achieve massive scale?
By applying information hiding
Global IP Network | AS2914
BGP Add-path
trying to untangle information hiding
Credits to: E. Jasinska (Netflix), P. Lucente (pmacct) @ NANOG61
Global IP Network | AS2914
BMP: untangling information hiding!
• BGP Monitoring Protocol (BMP)
• Seminal work became IETF RFC 7854 in 2016
• Uncomplicated protocol design
• Get visibility, in a standardized fashion, of all reachability information in
every processing stage
Global IP Network | AS2914
Example: traditional BGP monitoring
Peers Vantage
Point
Best
Path
Peering
Router
P0
P1
P2
P3
P4
P3
And VP does not even
know why P3 was chosen
Credits to: R. Bush (IIJ) @ BMP BoF, RIPE74
Global IP Network | AS2914
Example: monitoring with BMP
Peers Vantage
Point
Peering
Router
P0
P1
P2
P3
P4
Credits to: R. Bush (IIJ) @ BMP BoF, RIPE74
All
Paths
P0-4
With BMP, I learn all the paths the peering
router heard
Global IP Network | AS2914
Static
BGP Peer-B
Adj-Rib-In (Pre)
Adj-Rib-In (Post)
Filters/Policy Filters/Policy
Accepted Accepted
Adj-Rib-In (Post)
Adj-Rib-Out (Pre)
Adj-Rib-Out (Post)
Filters/Policy
BGP Peer-A
Adj-Rib-In (Pre)
ISIS
BMP visibility
Loc-Rib
Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98
BMP visibility
BMP
visibility
BMP visibility
Global IP Network | AS2914
Global IP Network | AS2914
Loc-RIB use-cases
• Monitor routes selected and used by the router:
o ECMP
o Correlation with NetFlow/IPFIX
o Next-hop preservation
• Monitor locally originated and BGP routes without requiring peering
• Policy verification
Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98
Global IP Network | AS2914
Global IP Network | AS2914
Adj-Rib-Out use-cases
• Policy verification
• Monitor routes advertised to peers
o Routing hygiene
o Closed-loop operations
Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98
Global IP Network | AS2914
Global IP Network | AS2914
Use-cases for TLVs
• Which paths are active, which backup, etc.?
o draft-cppy-grow-bmp-path-marking-tlv
• Which policy on which node did filter out a route?
o draft-xu-grow-bmp-route-policy-attr-trace
• Countless others
Global IP Network | AS2914
Recap: current works on BMP
• Make the protocol extensible
• Polish registries
• Get extra visibility in certain Routing Information Base (RIB) characteristics
• Get visibility in BGP policies
• Quick restore of BMP sessions
Global IP Network | AS2914
Recap: where does BMP fit?
Forwarding
Plane
Control
Plane
Topology
Data Collection
Network
Big Data & Analytics
BMP IPFIX
In Situ OAM
sFlow
Netstream
Netflow
gRPC
gNMI
OpenConfig
YANG
Credits to: T. Graf (Swisscom) @ UBBF 2018
Together we do great things
Thank you.
Paolo Lucente
Principal Network Tools Engineer
Global IP Network
paolo.lucente@global.ntt
www.gin.ntt.net
@GinNTTnet #globalipnetwork #AS2914

Más contenido relacionado

La actualidad más candente

RPKI: An Operator’s Implementation
RPKI: An Operator’s ImplementationRPKI: An Operator’s Implementation
RPKI: An Operator’s ImplementationMyNOG
 
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun SingIndonesia Network Operators Group
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen MaMyNOG
 
IPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksIPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksAPNIC
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersSolarWinds
 
Community tools to fight against DDoS
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoSFakrul Alam
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesFebrian ‎
 
IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17APNIC
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksAPNIC
 
Enterprise Multihoming - CTO Forum
Enterprise Multihoming - CTO ForumEnterprise Multihoming - CTO Forum
Enterprise Multihoming - CTO ForumAPNIC
 
OPEN RAN by Pourya Alinezhad
OPEN RAN by Pourya AlinezhadOPEN RAN by Pourya Alinezhad
OPEN RAN by Pourya AlinezhadPourya Alinezhad
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private networkhayenas
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
5G Standards Timeline
5G Standards Timeline5G Standards Timeline
5G Standards Timeline3G4G
 
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...Indonesia Network Operators Group
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT TutorialAPNIC
 

La actualidad más candente (20)

RPKI: An Operator’s Implementation
RPKI: An Operator’s ImplementationRPKI: An Operator’s Implementation
RPKI: An Operator’s Implementation
 
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
12 (IDNOG02) SGIX and Singapore Internet Landscape by Kerk Chun Sing
 
Social CDN Business : Paid or Free - bdNOG12 Panel Discussion
Social CDN Business : Paid or Free - bdNOG12 Panel DiscussionSocial CDN Business : Paid or Free - bdNOG12 Panel Discussion
Social CDN Business : Paid or Free - bdNOG12 Panel Discussion
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 
IPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksIPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networks
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
 
Community tools to fight against DDoS
Community tools to fight against DDoSCommunity tools to fight against DDoS
Community tools to fight against DDoS
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE Networks
 
13 (IDNOG02) Bridging ASEAN 2.0 by Zulhaidi Mokti
13 (IDNOG02) Bridging ASEAN 2.0 by Zulhaidi Mokti13 (IDNOG02) Bridging ASEAN 2.0 by Zulhaidi Mokti
13 (IDNOG02) Bridging ASEAN 2.0 by Zulhaidi Mokti
 
Enterprise Multihoming - CTO Forum
Enterprise Multihoming - CTO ForumEnterprise Multihoming - CTO Forum
Enterprise Multihoming - CTO Forum
 
OPEN RAN by Pourya Alinezhad
OPEN RAN by Pourya AlinezhadOPEN RAN by Pourya Alinezhad
OPEN RAN by Pourya Alinezhad
 
routing Protocols and Virtual private network
routing Protocols and Virtual private networkrouting Protocols and Virtual private network
routing Protocols and Virtual private network
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
5G Standards Timeline
5G Standards Timeline5G Standards Timeline
5G Standards Timeline
 
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
 
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...
05 (IDNOG02) Technology to reserve the redundancy on the layer2 network by Sa...
 
IoT Gent meetup
IoT Gent meetupIoT Gent meetup
IoT Gent meetup
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 

Similar a BMP: the pa amb tomàquet your BGP monitoring was missing

BGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveBGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveMiya Kohno
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdPavel Odintsov
 
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...APNIC
 
Manrs 7_sept__indonesia
Manrs  7_sept__indonesiaManrs  7_sept__indonesia
Manrs 7_sept__indonesiaNaveenLakshman
 
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PROIDEA
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceBertrand Duvivier
 
Stingray SG- solution for internet service providers
Stingray SG- solution for internet service providers  Stingray SG- solution for internet service providers
Stingray SG- solution for internet service providers Liubov Belousova
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPROIDEA
 
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용YoungbeomKim5
 
Advancebgp 100530220734-phpapp02
Advancebgp 100530220734-phpapp02Advancebgp 100530220734-phpapp02
Advancebgp 100530220734-phpapp02Jamil Jamil
 
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdfslides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdfThomasGraf42
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bullsSwapnil Kapate
 
Bgp 1232073634451868-3
Bgp 1232073634451868-3Bgp 1232073634451868-3
Bgp 1232073634451868-3afzel
 

Similar a BMP: the pa amb tomàquet your BGP monitoring was missing (20)

BGP
BGPBGP
BGP
 
BGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveBGP evolution -from SDN perspective
BGP evolution -from SDN perspective
 
GoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPdGoBGP : yet another OSS BGPd
GoBGP : yet another OSS BGPd
 
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...
BMP (BGP Monitoring Protocol) Testing by JANOGers -1, by Shishio Tsuchiya [AP...
 
BMP Test Results
BMP Test ResultsBMP Test Results
BMP Test Results
 
Manrs 7_sept__indonesia
Manrs  7_sept__indonesiaManrs  7_sept__indonesia
Manrs 7_sept__indonesia
 
BGP
BGPBGP
BGP
 
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
PLNOG 6: Robert Raszuk, Nana Ogawa - FIB table saving technique (with simple ...
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06CCCNP ROUTE v6_ch06
CCCNP ROUTE v6_ch06
 
Stingray SG- solution for internet service providers
Stingray SG- solution for internet service providers  Stingray SG- solution for internet service providers
Stingray SG- solution for internet service providers
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
 
Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용
한국정보통신기술협회 5 g-b5g 표준기술 세미나-배포용
 
Advancebgp 100530220734-phpapp02
Advancebgp 100530220734-phpapp02Advancebgp 100530220734-phpapp02
Advancebgp 100530220734-phpapp02
 
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdfslides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Bgp 1232073634451868-3
Bgp 1232073634451868-3Bgp 1232073634451868-3
Bgp 1232073634451868-3
 

Más de CSUC - Consorci de Serveis Universitaris de Catalunya

Más de CSUC - Consorci de Serveis Universitaris de Catalunya (20)

Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)
 
Publicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de RecercaPublicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de Recerca
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
 
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
 
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
 
Security Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademySecurity Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademy
 
The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
 
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
 
La gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolas
 
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
 
Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...
 
Enginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fonsEnginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fons
 
Transformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IATransformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IA
 
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de BarcelonaDifusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
 
Fons de discos perforats de cartró
Fons de discos perforats de cartróFons de discos perforats de cartró
Fons de discos perforats de cartró
 
Biblioteca Digital Gencat
Biblioteca Digital GencatBiblioteca Digital Gencat
Biblioteca Digital Gencat
 
El fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusióEl fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusió
 
El CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físicsEl CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físics
 
Els serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUCEls serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUC
 
SIG-NOC Tools Survey
SIG-NOC Tools SurveySIG-NOC Tools Survey
SIG-NOC Tools Survey
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

BMP: the pa amb tomàquet your BGP monitoring was missing

  • 1. BMP: the pa amb tomàquet that your BGP monitoring was missing Paolo Lucente Principal Network Tools Engineer Global IP Network Division at NTT Ltd 02 July 2021 - CATNIX Technical Commission Meeting
  • 2. Global IP Network | AS2914 whoami Paolo Lucente paololucente plucente @Paolo_Lucente
  • 3. Global IP Network | AS2914 BGP (The) control-plane protocol to advertise Reachability Information
  • 4. Global IP Network | AS2914 Why monitoring BGP? • To verify correct functioning of control-plane • To correlate control-plane data to: o Material aspects, ie. reliability of pipes or volumes of traffic o Business aspects, ie. cost of traffic trajectories, adherence to SLAs • To contribute enablement of closed-loop operations
  • 5. Global IP Network | AS2914 What is the main feature of BGP? Massive scale. So massive that BGP is the control-plane protocol that governs exchange of Reachability Information on the global Internet.
  • 6. Global IP Network | AS2914 Wow! How does BGP achieve massive scale?
  • 7. Global IP Network | AS2914 Credits to: Gary Bernhardt @ CodeMash 2012
  • 8. Global IP Network | AS2914 Wow! How does BGP achieve massive scale? By applying information hiding
  • 9. Global IP Network | AS2914 BGP Add-path trying to untangle information hiding Credits to: E. Jasinska (Netflix), P. Lucente (pmacct) @ NANOG61
  • 10. Global IP Network | AS2914 BMP: untangling information hiding! • BGP Monitoring Protocol (BMP) • Seminal work became IETF RFC 7854 in 2016 • Uncomplicated protocol design • Get visibility, in a standardized fashion, of all reachability information in every processing stage
  • 11. Global IP Network | AS2914 Example: traditional BGP monitoring Peers Vantage Point Best Path Peering Router P0 P1 P2 P3 P4 P3 And VP does not even know why P3 was chosen Credits to: R. Bush (IIJ) @ BMP BoF, RIPE74
  • 12. Global IP Network | AS2914 Example: monitoring with BMP Peers Vantage Point Peering Router P0 P1 P2 P3 P4 Credits to: R. Bush (IIJ) @ BMP BoF, RIPE74 All Paths P0-4 With BMP, I learn all the paths the peering router heard
  • 13. Global IP Network | AS2914 Static BGP Peer-B Adj-Rib-In (Pre) Adj-Rib-In (Post) Filters/Policy Filters/Policy Accepted Accepted Adj-Rib-In (Post) Adj-Rib-Out (Pre) Adj-Rib-Out (Post) Filters/Policy BGP Peer-A Adj-Rib-In (Pre) ISIS BMP visibility Loc-Rib Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98 BMP visibility BMP visibility BMP visibility
  • 14. Global IP Network | AS2914
  • 15. Global IP Network | AS2914 Loc-RIB use-cases • Monitor routes selected and used by the router: o ECMP o Correlation with NetFlow/IPFIX o Next-hop preservation • Monitor locally originated and BGP routes without requiring peering • Policy verification Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98
  • 16. Global IP Network | AS2914
  • 17. Global IP Network | AS2914 Adj-Rib-Out use-cases • Policy verification • Monitor routes advertised to peers o Routing hygiene o Closed-loop operations Credits to: T. Evens (Cisco), S. Bayraktar (Cisco), P. Lucente (NTT) @ GROW WG, IETF 98
  • 18. Global IP Network | AS2914
  • 19. Global IP Network | AS2914 Use-cases for TLVs • Which paths are active, which backup, etc.? o draft-cppy-grow-bmp-path-marking-tlv • Which policy on which node did filter out a route? o draft-xu-grow-bmp-route-policy-attr-trace • Countless others
  • 20. Global IP Network | AS2914 Recap: current works on BMP • Make the protocol extensible • Polish registries • Get extra visibility in certain Routing Information Base (RIB) characteristics • Get visibility in BGP policies • Quick restore of BMP sessions
  • 21. Global IP Network | AS2914 Recap: where does BMP fit? Forwarding Plane Control Plane Topology Data Collection Network Big Data & Analytics BMP IPFIX In Situ OAM sFlow Netstream Netflow gRPC gNMI OpenConfig YANG Credits to: T. Graf (Swisscom) @ UBBF 2018
  • 22. Together we do great things
  • 23. Thank you. Paolo Lucente Principal Network Tools Engineer Global IP Network paolo.lucente@global.ntt www.gin.ntt.net @GinNTTnet #globalipnetwork #AS2914