
Fabian Tech Tips

BGP Routing Protocol: A Comprehensive Guide
Feb 13
16 min read
0
23
0
BGP Routing Protocol: A Comprehensive Guide
BGP (Border Gateway Protocol) is the routing protocol that makes the internet work. It enables data routing between different autonomous systems (ASes). An AS is a network or group of networks under the control of a single administrative entity, such as an internet service provider (ISP) or a large organization 1. BGP is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet 2. As an Internet Engineering Task Force (IETF) standard, BGP is the most scalable of all routing protocols 3. It is the routing protocol of the global Internet, as well as for Service Provider private networks 3.
This article provides a detailed overview of BGP, including its purpose, features, benefits, configuration examples, installation tutorials, and troubleshooting guides.
Purpose of BGP
The main purpose of BGP is to exchange routing information between different ASes. This information includes the network prefixes that each AS can reach, as well as the paths that data packets can take to reach those prefixes. BGP uses this information to create a routing table that lists the best path to each destination network. When a BGP router receives a packet, it looks up the destination network in its routing table and forwards the packet to the next hop router on the best path (cited source to be added as per feedback).
BGP is also used to implement routing policies. Routing policies allow ASes to control how their traffic is routed. For example, an AS might want to prefer one path over another, or it might want to block certain types of traffic. BGP provides a flexible framework for implementing routing policies.
BGP is important because, at its core, the internet is made of hundreds of thousands of autonomous systems 4. Data travels between autonomous systems as it moves from source to destination. BGP supports every autonomous system to...source the critical role of BGP in ensuring a stable and interconnected internet by enabling communication between diverse networks5.
Features of BGP
BGP is a complex protocol with a wide range of features. Some of the most important features of BGP include:
Path Vector Routing: BGP is a path vector routing protocol, which means that it stores the entire path to a destination network in its routing table. This allows BGP to make more informed routing decisions than distance-vector routing protocols, which only store the distance to the next hop router.
Policy-Based Routing: BGP allows ASes to implement routing policies. Routing policies allow ASes to control how their traffic is routed. For example, an AS might want to prefer one path over another, or it might want to block certain types of traffic.
Scalability: BGP is highly scalable, which means that it can be used to route traffic in very large networks. This is essential for the internet, which is made up of millions of networks.
Reliability: BGP is a reliable protocol, which means that it can be used to route traffic even in the event of network failures. This is important for the internet, which is a critical infrastructure.
Security: BGP supports security features, such as authentication and encryption. This helps to protect BGP routing information from being tampered with or intercepted.
Key elements of BGP routing: BGP routing involves key elements like autonomous systems, routes, border routers, and peering 5.
Autonomous Systems (AS): An AS is a network or a collection of connected IP routing prefixes under the control of one or multiple network operators that present a common routing policy to the internet.
Routes: A route in BGP is a path that data packets take from one host on the internet to another. Routes are known as Network Layer Reachability Information (NLRI).
Border Routers: These are routers situated at the edge of an AS, responsible for connecting to at least one router from a different AS and advertising routes through peering sessions.
Peering: Peering is the reciprocal data exchange between two different ASs through their border routers. Peering ensures data packets find their way to the right destination.
Specific features:
Maximum Routes Received for IPv4/v6 (Max Prefix Limit): This optional feature allows users to configure a maximum number of routes to allow a peer to advertise to the router before resetting their BGP sessions 7.
AS Path Prepend: This allows users to set the number of prepends to the AS path. With values set larger than 0, the router adds its own ASN to the AS path based on the value of the prepend that the user selects 7.
AS Override: This overwrites one or more instances of the BGP peer ASN found within the AS path advertised by the router 7.
BGP operational algorithm: BGP maintains a list of networks received from each neighbor, which might contain multiple paths to a destination network and contains BGP attributes for each path 8.
BGP message header fields: BGP message headers include fields like Marker, Length, and Type 8.
BGP messages: BGP uses four types of messages: OPEN, UPDATE, NOTIFICATION, and KEEPALIVE 9.
The OPEN message establishes BGP adjacency, creating a foundation for further communication.
The UPDATE message advertises, updates, or withdraws routes.
The NOTIFICATION message indicates error conditions to a BGP neighbor.
The KEEPALIVE message ensures that BGP neighbors are still alive and kicking.
Benefits of BGP
BGP provides a number of benefits, including:
Efficient Routing: BGP enables efficient routing by determining the best path for data packets to reach their destinations. It considers factors like network performance, cost, and policies set by network administrators 10.
Scalability: BGP is highly scalable, allowing the Internet to accommodate the immense growth of networks and users 11.
Multi-homed Connectivity: BGP supports multi-homed connectivity, meaning an organization can connect to multiple internet service providers (ISPs) simultaneously 11. Emphasize the significance of BGP in facilitating multihoming, allowing organizations to connect to multiple ISPs for enhanced redundancy and load balancing5.
Internet Traffic Control: BGP gives organizations control over their internet traffic. They can influence data flow by setting policies and preferences in the routing decisions 11.
Internet Resilience: BGP enhances internet resilience by quickly adapting to network changes and failures 11.
Understanding BGP: Understanding BGP is crucial for controlling your organization's destiny on the internet, leading to several key benefits, such as revenue growth, infrastructure uptime, and enhanced security 5.
Discuss the trade-off between optimization and convergence speed in BGP, explaining how BGP prioritizes optimal routing over fast convergence12.
BGP Finite State Machine
BGP uses a finite-state machine (FSM) to manage the peering sessions with its neighbors. The FSM consists of six states: Idle, Connect, Active, OpenSent, OpenConfirm, and Established 2. For each peer-to-peer session, a BGP implementation maintains a state variable that tracks which of these six states the session is in. The BGP defines the messages that each peer should exchange in order to change the session from one state to another.
BGP Configuration Examples
This section provides examples of BGP configuration on different network devices. To illustrate the purpose and context of the commands, let's consider a simple network topology with two routers, R1 and R2, connected directly. R1 belongs to AS 100 and has a loopback interface with the IP address 10.1.1.1/32. R2 belongs to AS 200 and has a loopback interface with the IP address 20.2.2.2/32. The goal is to configure BGP on both routers to exchange routing information and enable reachability between the loopback interfaces.
Cisco Routers
To configure BGP on a Cisco router, you can use the following commands:
router bgp <AS-number> neighbor <peer-IP-address> remote-as <peer-AS-number> network <network-address> mask <subnet-mask>
For example, to configure BGP on R1 with AS number 100 and peer router R2 with IP address 192.168.1.2 and AS number 200, you would use the following commands:
router bgp 100 neighbor 192.168.1.2 remote-as 200 network 10.1.1.1 mask 255.255.255.255
This configuration will establish a BGP peering session between the two routers and advertise the network 10.1.1.1/32 to R2.
Similarly, on R2, you would use the following commands:
router bgp 200 neighbor 192.168.1.1 remote-as 100 network 20.2.2.2 mask 255.255.255.255
Juniper Routers
To configure BGP on a Juniper router, you can use the following commands:
set protocols bgp group <group-name> type external set protocols bgp group <group-name> local-address <local-IP-address> set protocols bgp group <group-name> neighbor <peer-IP-address> peer-as <peer-AS-number>
For example, to configure BGP on R1 with peer router R2 with IP address 192.168.1.2 and AS number 200, you would use the following commands:
set protocols bgp group ebgp-peers type external set protocols bgp group ebgp-peers local-address 192.168.1.1 set protocols bgp group ebgp-peers neighbor 192.168.1.2 peer-as 200
This configuration will establish a BGP peering session between the two routers.
Similarly, on R2, you would use the following commands:
set protocols bgp group ebgp-peers type external set protocols bgp group ebgp-peers local-address 192.168.1.2 set protocols bgp group ebgp-peers neighbor 192.168.1.1 peer-as 100
BGP Installation Tutorials
This section provides tutorials on installing and configuring BGP on a network. Before diving into the configuration steps, it is imperative to ensure that your network and devices meet certain prerequisites 13. First, you need to have administrative access to your routers. Secondly, ensure your routers support BGP—most modern routers do. You'll also need to know your AS number and have a clear network layout indicating which routers will be using BGP. Understanding these prerequisites is essential for a successful BGP setup.
Installing BGP on a Cisco Router
To install BGP on a Cisco router, you can use the following steps:
Enable the BGP routing process using the router bgp <AS-number> command.
Configure the BGP router ID using the bgp router-id <router-id> command.
Configure the BGP neighbors using the neighbor <peer-IP-address> remote-as <peer-AS-number> command.
Advertise the networks that you want to advertise to your BGP peers using the network <network-address> mask <subnet-mask> command.
Installing BGP on a Juniper Router
To install BGP on a Juniper router, you can use the following steps:
Enable the BGP routing process using the set protocols bgp group <group-name> type external command.
Configure the BGP router ID using the set routing-options router-id <router-id> command.
Configure the BGP neighbors using the set protocols bgp group <group-name> neighbor <peer-IP-address> peer-as <peer-AS-number> command.
Configure the BGP export policy to advertise the networks that you want to advertise to your BGP peers.
BGP Troubleshooting Guides
This section provides troubleshooting guides for common BGP issues.
Troubleshooting BGP Session Failures
If a BGP session fails to establish, you can use the following steps to troubleshoot the issue:
Verify that the BGP routers can reach each other. You can use the ping command to test connectivity14.
Verify that the BGP configuration is correct on both routers. This includes the AS numbers, BGP peer IP addresses, and authentication keys14.
Verify that there are no firewalls or access lists blocking BGP traffic14.
If you are still unable to establish a BGP session, you can use the debug ip bgp command to troubleshoot the issue further.
Check for common BGP neighbor adjacency issues, such as Layer 2 or Layer 3 problems, access-list blocking TCP port 179, or incorrect IP addresses configured for the BGP neighbor router15.
Troubleshooting BGP Route Flapping
If a BGP route is flapping, you can use the following steps to troubleshoot the issue:
Identify the flapping route. You can use the show ip bgp command to view the BGP routing table and identify the route that is flapping.
Identify the cause of the flapping. This could be due to a number of factors, such as a hardware issue, a link flapping, or an unstable configuration.
Once you have identified the cause of the flapping, you can take steps to resolve the issue. This might involve fixing a hardware issue, stabilizing a link, or correcting a configuration error.
BGP Security Best Practices
This section provides information on BGP security best practices.
Implement RPKI
Resource Public Key Infrastructure (RPKI) is a cryptographic framework that is used to verify the authenticity of BGP routing announcements. RPKI uses digital signatures to create Route Origin Authorizations (ROAs) 16. ROAs are digitally signed objects that bind IP address prefixes to specific Autonomous Systems. Routers rely on authorized ROAs to verify that BGP route announcements are coming from an authorized source. This ensures that only legitimate routes are accepted, preventing the propagation of unauthorized or invalid routes.
Implement BGPsec
BGPsec is a security extension for BGP that provides secure origin validation and path validation for BGP updates. BGPsec adds cryptographic signatures to BGP messages, ensuring that only legitimate routing information is accepted by routers and other network entities 16.
Secure Authentication and Session Establishment
Strong authentication and secure session management are crucial to prevent unauthorized access to BGP routers and other network entities. Administrators should enforce strict policies to safeguard the login process, such as avoiding password reuse and enabling multi-factor authentication (MFA) for added protection 16. Additionally, cryptographic algorithms, like MD5 or SHA-256, can be used to verify the identity of BGP peers. By default, BGP peering does not require authentication 17. With no authentication, an attacker could craft a BGP packet to either inject a route or shut down a BGP neighborship,...source Preventative Measures and Best Practices
Here are some key preventative measures and best practices in BGP configuration 18:
Regular Network Monitoring and Auditing: Regularly monitor BGP configurations and performance metrics to detect and mitigate potential problems.
Adopt a Conservative Approach to BGP Peering: Carefully select BGP peers and implement appropriate filtering and security measures.
Enhanced BGP Security Protocols: Utilize security protocols like RPKI and BGPsec to enhance the security of BGP deployments.
Comprehensive Training and Learning Resources: Stay updated with the latest developments and best practices in BGP through continuous education and training.
BGP Threats
BGP is susceptible to various security threats, including 19:
Denial of Service (DoS): A malicious host floods a BGP neighbor with unexpected or unwanted traffic, overwhelming control plane resources and hindering the processing of legitimate BGP traffic.
Route Manipulation: A malicious host alters the contents of a BGP routing table, diverting sender traffic and preventing it from reaching its intended destination without the sender's knowledge.
Route Hijacking: A rogue BGP neighbor deceitfully advertises a victim's networks to redirect a portion or all of the victim's traffic toward itself.
Misconfiguration (non-malicious): Unintentional misconfiguration of a BGP router can disrupt the Internet's BGP routing table, potentially causing network outages and unauthorized access to network traffic.
Advanced BGP Topics
This section provides information on advanced BGP topics, such as route filtering, route dampening, and route redistribution.
Route Filtering
Route filtering allows you to control which routes are advertised and received by a BGP router. This can be used to improve network security, reduce routing table size, and optimize traffic flow. There are a number of different ways to filter routes in BGP, such as using prefix lists, AS path filters, and route maps 20.
Different peering relationships require different filtering considerations 21. For example, when peering with public or private peers, filters should be implemented to prevent the propagation of martian addresses, bogon prefixes, or routes that are too specific. When peering with upstream providers, filters should be used to control which prefixes are announced to the provider and to prevent the accidental advertisement of internal prefixes. When peering with downstream customers, filters should be used to ensure that customers only advertise prefixes that they are authorized to announce and to prevent route leaks.
Highlight the crucial role of route filtering in preventing route leaks and maintaining network security by controlling the propagation of routing information21.
Route Dampening
Route dampening is a mechanism that is used to reduce the impact of route flapping. Route flapping occurs when a route is repeatedly advertised and withdrawn. This can cause instability in the network and increase the load on routers. Route dampening works by assigning a penalty to flapping routes. When the penalty for a route exceeds a certain threshold, the route is suppressed and is not advertised to other BGP routers 22.
Route dampening decreases the propagation of flapping routes 23. Without route dampening, autonomous systems continually send advertisement and withdrawal messages each time...source connect different parts of your network that are using different routing protocols. For example, you might want to redistribute routes from OSPF into BGP so that your OSPF network can reach the internet 24.
BGP vs. OSPF
BGP and OSPF are both routing protocols, but they are used in different ways. BGP is an exterior gateway protocol (EGP), which means that it is used to route traffic between different ASes. OSPF is an interior gateway protocol (IGP), which means that it is used to route traffic within an AS.
Here is a table comparing BGP and OSPF:
Feature | BGP | OSPF |
Routing Algorithm | Path Vector | Link State |
Convergence Speed | Slow | Fast |
Domain | Inter-domain | Intra-domain |
Operation | Between two ASes | Inside an AS |
Transport Protocol | TCP | IP |
Route Selection Metric | Path attributes and routing policies | Cost |
Scalability | High | Lower |
Configuration | More complex | Simpler |
BGP Case Studies
This section provides real-world case studies of BGP deployments.
The First-Ever Recorded Global BGP Accident
This was the first-ever recorded global BGP accident 25. It was just another ordinary day of 1997. The internet was in its infancy, and the majority of providers fully trusted each other. Suddenly, the internet was no more. The root of the problem was a small regional provider in the USA, who by mistake announced the wrong routing information. Upon receiving BGP information, routers choose the best route to the destination network and add it to their routing tables. BGP uses several parameters to determine the best route. The most obvious one is the number of networks to the destination or length of the so-called AS-Path. The smaller the number, the better the route. The root of the problem was quickly eliminated – the port on the failed router was disabled, which stopped fake...source
The YouTube Incident in 2008
On February 24, 2008, the entire world lost access to most YouTube resources for an hour and a half 26. Essentially, this has happened because the Government of Pakistan decided to block access to the video service due to the presence of offensive videos posted there. Supposedly, they intended to route traffic to some of their internal resources;...source
AS path error: This occurs when an AS inserts itself as an illegitimate intermediary into the forwarding path of traffic bound for a different destination.
Latest Developments in BGP
This section provides information on the latest developments in BGP, such as BGP EVPN and BGP FlowSpec.
BGP EVPN
BGP EVPN (Ethernet Virtual Private Network) is an extension of BGP that provides efficient and scalable Ethernet-based VPN solutions 28. It is commonly used in data centers and service provider networks to address various use cases. BGP EVPN allows for the network to carry endpoint reachability information such as Layer 2 MAC addresses and Layer 3 IP addresses 29. This control plane technology uses MP-BGP for MAC and IP address endpoint distribution, where MAC addresses are treated as routes.
The MP-BGP EVPN control plane offers the following main benefits 30:
The MP-BGP EVPN protocol is based on industry standards, allowing multivendor interoperability.
It enables control-plane learning of end-host Layer-2 and Layer-3 reachability information, enabling organizations to build more robust and scalable VXLAN overlay networks.
It uses the decade-old MP-BGP VPN technology to support scalable multitenant VXLAN overlay networks.
BGP FlowSpec
BGP FlowSpec (Flow Specification) is a BGP extension that allows network operators to define and distribute traffic filtering rules 31. These rules can be used to mitigate DDoS attacks, enforce quality of service (QoS) policies, and implement other traffic management functions. Flowspec uses BGP as the carrier for DDoS mitigation policies and the upstream service provider's network to enforce them at the edge 32.
Explain how BGP FlowSpec provides a more efficient and scalable solution for mitigating DDoS attacks compared to traditional methods by leveraging the service provider's network infrastructure32.
BGP FlowSpec offers several benefits, including 33:
Bandwidth Optimization: BGP Flowspec allows network operators to specify and propagate rules to enforce traffic flow. It helps reduce congestion and improves network performance by allowing users to define their own policies, such as rate-limiting, or dropping certain types of traffic.
Latency Reduction: BGP Flowspec allows network administrators to specify and enforce specific rules on the traffic flows going through their infrastructure. With these rules, it is possible to prioritize certain types of traffic and ensure that they are transmitted faster than others.
Conclusion
BGP is a critical protocol that enables the internet to function. It is a complex protocol with a wide range of features and benefits. This article has provided a detailed overview of BGP, including its purpose, features, benefits, configuration examples, installation tutorials, and troubleshooting guides. By understanding BGP, you can better understand how the internet works and how to troubleshoot network problems.
BGP plays a crucial role in maintaining the stability and interconnectivity of the internet by facilitating communication and routing between diverse networks. However, BGP also presents challenges, such as the potential for route leaks, hijacking, and the need for robust security measures. The future of BGP involves continuous development to address these challenges and improve its scalability, security, and efficiency. This includes advancements like BGP EVPN and BGP FlowSpec, which provide enhanced capabilities for network virtualization, traffic engineering, and DDoS mitigation. As the internet continues to evolve, BGP will remain a cornerstone of internet routing, and understanding its intricacies will be essential for network engineers and administrators.
Works cited
1. Unlocking BGP Mastery: Expert Insights and In-depth Knowledge for Seamless Border Gateway Protocol Implementation and Optimization - RSTForum, accessed on February 13, 2025, https://rstforum.net/knowledge-base/bgp
2. Border Gateway Protocol - Wikipedia, accessed on February 13, 2025, https://en.wikipedia.org/wiki/Border_Gateway_Protocol
3. Border Gateway Protocol (BGP) - Cisco, accessed on February 13, 2025, https://www.cisco.com/c/en/us/products/ios-nx-os-software/border-gateway-protocol-bgp/index.html
4. What is BGP (Border Gateway Protocol)? - AWS, accessed on February 13, 2025, https://aws.amazon.com/what-is/border-gateway-protocol/
5. BGP Routing: An In-Depth Tutorial and Examples - Kentik, accessed on February 13, 2025, https://www.kentik.com/kentipedia/bgp-routing/
6. BGP (Border Gateway Protocol): What is it? - Link11, accessed on February 13, 2025, https://www.link11.com/en/glossar/bgp-border-gateway-protocol/
7. Border Gateway Protocol (BGP) Features - Equinix Product Documentation, accessed on February 13, 2025, https://docs.equinix.com/en-us/Content/Interconnection/FCR/FCR-bgp.htm
8. Overview of the BGP (Border Gateway Protocol) | BGP.us, accessed on February 13, 2025, https://www.bgp.us/
9. A Guide to Border Gateway Protocol (BGP) Routing and Its Applications - CacheFly, accessed on February 13, 2025, https://www.cachefly.com/news/a-guide-to-border-gateway-protocol-bgp-routing-and-its-applications/
10. www.simplilearn.com, accessed on February 13, 2025, https://www.simplilearn.com/border-gateway-protocol-article#:~:text=BGP%20enables%20efficient%20routing%20by,faster%20and%20more%20reliable%20communication.
11. Border Gateway Protocol (BGP): A Comprehensive Guide - Simplilearn.com, accessed on February 13, 2025, https://www.simplilearn.com/border-gateway-protocol-article
12. Why Is BGP the King of Routing Protocols? - PivIT Global, accessed on February 13, 2025, https://info.pivitglobal.com/resources/bgp-king-of-routing-protocols
13. Step-by-Step Guide to Configuring BGP on Your Router | Orhan Ergun, accessed on February 13, 2025, https://orhanergun.net/step-by-step-guide-to-configuring-bgp-on-your-router
14. BGP Troubleshooting Cheat Sheet With Examples - Catchpoint, accessed on February 13, 2025, https://www.catchpoint.com/bgp-monitoring/bgp-troubleshooting-cheat-sheet
15. Troubleshooting BGP Neighbor Adjacency - NetworkLessons.com, accessed on February 13, 2025, https://networklessons.com/bgp/troubleshooting-bgp-neighbor-adjacency
16. How to detect and avoid BGP insecurity and hijacks - Site24x7, accessed on February 13, 2025, https://www.site24x7.com/learn/bgp-hijacking.html
17. 4 Best Practices for Hardening Enterprise BGP Deployments - BlueAlly, accessed on February 13, 2025, https://www.blueally.com/4-best-practices-for-hardening-enterprise-bgp-deployments/
18. Common BGP Problems and How to Fix Them: Real-World Solutions | NSC - NetSecCloud, accessed on February 13, 2025, https://netseccloud.com/common-bgp-problems-and-how-to-fix-them-real-world-solutions
19. Border Gateway Protocol (BGP) Enhancements & Security Guide - Brander Group, accessed on February 13, 2025, https://brandergroup.net/guide-border-gateway-protocol-bgp-enhancements-security/
20. BGP Zero to Hero Part 8, BGP filtering methods - Cisco Learning Network, accessed on February 13, 2025, https://learningnetwork.cisco.com/s/article/BGP-Zero-to-Hero-Part-8-BGP-filtering-methods
21. BGP Filtering Best Practices - eBook - Noction, accessed on February 13, 2025, https://www.noction.com/knowledge-base/bgp-filtering
22. BGP Route Dampening - NetworkLessons.com, accessed on February 13, 2025, https://networklessons.com/bgp/bgp-route-dampening
23. BGP Route Dampening - Check Point Software Technologies, accessed on February 13, 2025, https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_Advanced_Routing_AdminGuide/Topics-GARG/BGP-Route-Dampening.htm
24. Understand the Redistribution of OSPF Routes into BGP - Cisco, accessed on February 13, 2025, https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/5242-bgp-ospf-redis.html
25. BGP case studies that illustrate the crucial BGP vulnerability, accessed on February 13, 2025, https://www.bgp.us/case-studies/
26. BGP Design and Deployment in the Datacenter (Real-life) - YouTube, accessed on February 13, 2025, https://www.youtube.com/watch?v=7uYhm0Po-bE
27. A Brief History of the Internet's Biggest BGP Incidents | Kentik Blog, accessed on February 13, 2025, https://www.kentik.com/blog/a-brief-history-of-the-internets-biggest-bgp-incidents/
28. BGP-EVPN for VxLAN: The Future of Networking Unleashed, accessed on February 13, 2025, https://www.ruckusnetworks.com/blog/2023/bgp-evpn-for-vxlan-the-future-of-networking-unleashed/
29. What is EVPN-VXLAN in an enterprise network? | Juniper Networks US, accessed on February 13, 2025, https://www.juniper.net/us/en/research-topics/what-is-evpn-vxlan.html
30. VXLAN Network with MP-BGP EVPN Control Plane Design Guide - Cisco, accessed on February 13, 2025, https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/guide-c07-734107.html
31. Implementing BGP Flowspec - Cisco, accessed on February 13, 2025, https://www.cisco.com/c/en/us/td/docs/routers/ncs6000/software/ncs6k-r6-2/routing/configuration/guide/b-routing-cg-ncs6000-62x/b-routing-cg-ncs6000-62x_chapter_011.pdf
32. How to Use BGP Flowspec as Your Network's Smart DDoS Shield - Equinix Metal, accessed on February 13, 2025, https://deploy.equinix.com/blog/how-to-use-bgp-flowspec-to-filter-and-mitigate-ddos-attacks/
33. BGP Flowspec - How it Works & Benefits for Network Security | Orhan Ergun, accessed on February 13, 2025, https://orhanergun.net/bgp-flowspec