Peer Policy Policing with NETFLOW NANOG 25 June 9, 2002.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 Experimental Study of Internet Stability and Wide-Area Backbone Failure Craig Labovitz, Abha Ahuja Merit Network, Inc Presented by Changchun Zou.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
Practical and Configuration issues of BGP and Policy routing Cameron Harvey Simon Fraser University.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
Congestion Mitigation Trying to maximise performance between MFN’s network and a peer’s network over some busy PNIs.
Inter-domain Routing Outline Border Gateway Protocol.
TUNDRA The Ultimate Netflow Data Realtime Analysis Jeffrey Papen Yahoo! Inc.
Chapter 13: WAN Technologies and Routing 1. LAN vs. WAN 2. Packet switch 3. Forming a WAN 4. Addressing in WAN 5. Routing in WAN 6. Modeling WAN using.
More on the IP Internet Protocol. Internet Layer Process Transport layer process passes EACH TCP segment to the internet layer process for delivery Transport.
Coarse-Grained Traffic Analysis in ISP Networks A Router-Based Approach Christian Martin Verizon.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
IP Traffic Management Applications Measurement, Analysis, and Optimization.
TCOM 515 Lecture 6.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Day 12 Chapter 13 WAN Technologies and Routing. Classification of Networks LAN – spans a single building or campus MAN – Spans a city WAN – Spans multiple.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
Architecting the Network Part 3 Geoff Huston Chief Scientist, Internet Telstra ISOC Workshop.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Connect. Communicate. Collaborate Experiences with tools for network anomaly detection in the GÉANT2 core Maurizio Molina, DANTE COST TMA tech. Seminar.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Routing Overview.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
1 Version 3.1 Module 6 Routed & Routing Protocols.
Advanced Technology Laboratories 8 December 2000 page 1 Characterization of Traffic at a Backbone POP Nina Taft Supratik Bhattacharyya Jorjeta Jetcheva.
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—7-1 Optimizing BGP Scalability Improving BGP Convergence.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Inter-domain Routing Outline Border Gateway Protocol.
1 Monitoring: from research to operations Christophe Diot and the IP Sprintlabs ipmon.sprintlabs.com.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
COMPUTER NETWORKS CS610 Lecture-15 Hammad Khalid Khan.
Semester 4 - Chapter 3 – WAN Design
100% REAL EXAM QUESTIONS ANSWERS
Flow Collection and Analytics
BGP supplement Abhigyan Sharma.
Architecting the Network Part 3
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
BGP Overview BGP concepts and operation.
Chapter 8: Monitoring the Network
Netscope: Traffic Engineering for IP Networks
Binit Mohanty Ketan Rajawat
COMP/ELEC 429/556 Introduction to Computer Networks
COS 461: Computer Networks
Scrumium NetBrain Thursday, May 09, 2019.
Presentation transcript:

Peer Policy Policing with NETFLOW NANOG 25 June 9, 2002

Matthew Meyer Traffic Engineering NANOG 25 June 9, 2002

» On Net Cities » 27 On Net Countries » Nearly 100,000 route miles » 17 Metro Networks The Global Crossing Network

Peer Policy Policing With Netflow »Discovering and engaging the wayward packet flows that stumble onto your network »Giving default free networking a fighting chance »Get off my lawn »Bottom line: Just detecting a peer defaulting traffic us

Peer Policy Policing with Netflow Defining the problem »Telecom & Internet-space companies going into Ch11 »Punctuated mass customer moves due to Ch7 backbone liquidations »Peering less flexible »Some will resort to uncouth methods to mitigate the congestion and sidestep potential costs

Peer Policy Policing with Netflow Defining the problem »Fewer players, larger peerings »Peering inherits more flux and less flexibility to deal with it »Some more liberal peering channels may dry up or become heavily utilized

Peer Policy Policing with Netflow »Time to think like a bean counter »Is peering being abused? »Effect: Lower capex due to longer upgrade cycles »End goal: Knowing that we run a tight ship and being alerted when uninvited traffic enters the network Addressing the Problem

Peer Policy Policing with Netflow »Not rocket science »1:100 Netflow sampling »Sampling points: All traffic arriving on our border routers »Currently set to do peer-as type flow export Measurement

Peer Policy Policing with Netflow »One centrally located collector »Collector handling approximately 20 selected routers »Collector iBGP peers with border routers »Records route table changes every 5 minutes »Dual Pentium III, 1G memory, multiple Ultra-160 SCSI drives, directly connected to backbone Measurement

Peer Policy Policing with Netflow DEFAULTING PEER REPORT: Rec'd Peer Bytes percentage of total router interface destined for peer Bytes for interface br2.HUB1.gblx.net_so-2/1/ M <-Peer A br2.HUB1.gblx.net_so-2/1/ M <-Peer B br2.HUB1.gblx.net_so-3/1/ M <-Peer C br2.HUB1.gblx.net_so-2/1/ M <-Peer D br2.HUB1.gblx.net_at-2/2/ M <-Peer E br2.HUB1.gblx.net_so-1/2/ M <-Peer F br2.HUB1.gblx.net_so-3/1/ M <-Peer G br2.HUB1.gblx.net_so-0/0/ M <-uplink br2.HUB1.gblx.net_so-1/0/ M <-uplink Measurement

Peer Policy Policing with Netflow EXAMPLE OF FLOWDATA /Ixia/SeeFlow/bin/rseeas2as -S ' :00' br2.w00t1.gblx.net Facets: TimeInterval : 06/04/ :50: /04/ :31: UTC RouterIpv4Addr : InputIfIndex : 67 InputIfIpv4Addr : InputIfName : so-1/2/3.0 RouterName : br2.w00t1.gblx.net Src AS Dst AS Packets Pkts/sec Bytes Bits/sec K M K K M K K M K K M K K M K [~300 more lines clipped] Measurement

Peer Policy Policing with Netflow »Extracted with Ixia tools »24 hour cumulative byte count per interface + dest-as key pair »Created a peer-as list »Ignored incorrectly reported Netflow data according to routing policy Manipulating the Data

Peer Policy Policing with Netflow »Our design is hierarchical »Peers tend to be on dedicated peering routers »Our peering in consistent and rich »Collecting closer to the core would not catch this behavior universally Where to Look

Peer Policy Policing with Netflow »BGP import policy gets in the way of trusting source AS »Trace levels of false peer to peer traffic associated with most peering interfaces »In initial beta, no peers have been found blatantly defaulting to us Analysis

Peer Policy Policing with Netflow »For the moment peer defaulting does not seem to be a problem »We can move forward and easily complete a detection system »Feeling more confident about possible tighter peering ahead So Far So Good

Peer Policy Policing with Netflow »Change flow export style from peer-as to origin- as »Putting the discovery ‘on cron’ »Long term: »Distribute collection »Build some visualization »Integrate with RRDtool What’s Next

Peer Policy Policing with Netflow »Good exercise in ‘Netflow 101’ »Sampling capability excellent »Data quality excellent »Restored confidence in Netflow reliability Retrospect

GLOBAL REACH. SEAMLESS NETWORK.

THANK YOU