Hi Mauricio, thanks for the reply. I believe there are quite a few folks who automate their peering up keep with the help of the data contained within the IRRs. With the IRRs providing a mechanism for validating routing information and RPSL providing a common language for describing routing policy - automating the creation of prefix and AS-Path filters for peering sessions becomes attractive. Check out http://www.irr.net/docs/faq.html for additional reasons for using IRR data to generate routing policy.
IRRToolSet is a tool that can create router configurations based on IRR data. The portion I'm trying to figure out is the 'pushing' of these configurations. From what I gather, it seems that this is usually something thats homegrown. Anyone willing to share their homegrown tools? :) Cheers, RR On Sat, Jan 7, 2012 at 6:20 PM, Rodriguez, Mauricio <mrodrig...@fletnet.com>wrote: > Rafael, > > Hello! Nice to see you post on the list... > > This sounds like a nice idea. Do you know of anyone that's currently > running such an automated system? If you end up finding something, or > rolling it yourself, I would suggest being careful with his approach. > You're assuming that your peers are actually keeping the IRR records up to > date or that the information contained therein is appropriate for > non-transit peering sessions. If you have the right leverage, perhaps you > can make that a condition for peering. If you're manually keeping > prefix-list filters for each of your peers now, consider the return on that > level of detailed configuration. Is the risk mitigated really worth the > overhead? > > I would recommend that you keep your peer filters as simple as possible. > Inbound, certainly filter bogons, martians, your own prefixes, and any > prefixes received from other peers. Try using communities vs. individual > prefix entries as much as possible. Perhaps enforce the peer ASN with an > AS Path filter on the leading ASN on each prefix received. If you're > concerned about FIB size explosion, decide on a bit boundary for prefixes > to be accepted and filter on that. Certainly agree on a prefix-limit with > your peer and configure that on the peering session. You may have to be > diligent on monitoring sessions that drop due to prefix-limit violations > (SNMP Traps, syslog) and follow up to correct those as needed, since most > peers won't keep you informed on changes in their quantity of advertised > prefixes. Juniper routers can be configured to send warnings on certain > thresholds so you can catch normal growth vs. a fat-fingered configuration > by a peer. You can then take care of those proactively before sessions > start dropping. > > Outbound, don't let anything out other than your own prefixes or those > advertised to you by your customers. Otherwise, you may be providing free > transit to your upstreams and other peers. > > Just my $0.02, others will likely disagree and recommend that you keep > your prefix filters in place. I digress if there's some BCP out there that > I don't know about that indicates that prefix filters be used in this case. > > Regards, > Mauricio Rodriguez > Owner / Principal Engineer > Fletnet Network Engineering > > mauricio.rodrig...@fletnet.com > http://www.fletnet.com > > ***** Email confidentiality notice ***** > > This message is private and confidential. If you have received this message > in error, please notify us and remove it from your system. > > >