

*Extension operators: Blackhole (MAC ACL drop) 66:66:de:ad:be:ef at your edge with the member to participate in the SIX blackholing system. The route servers use members' IRR records to employ strict filtering of blackhole routes.Īdditional information on blackholing can be found at: Īccess-list blackhole-access-list permit x.y.z.a/32Ĭorrections, additional examples, and questions are welcome at info_a_t_. Route server announcements can also be tailored to specific ASNs using the community mechanisms detailed on the route server page. router bgp 65021 bgp bestpath as-path multipath-relax bgp. Per the RFC they also add the community NO_EXPORT prior to re-announcing routes to other route server users. blackhole the prefix of the route bgp community-list standard cm-blackhole permit 64512:100. Specifically, when the BLACKHOLE community 65535:666 is set for a route, the route servers automatically set the appropriate next-hop for the relevant address family and peering VLAN. The SIX route servers also support blackholing in the form of RFC 7999. This same relaxing of restrictions is needed to allow next-hop to not match the peering session when next-hop matches one of the reserved blackhole IP addresses.
#Bgp blackhole full#
(Members connected to the fabric via an extension switch may not have traffic to them blocked from other members on the same extension.*)Īny member can configure their BGP peering to announce prefixes with a next-hop set to the blackhole IP address for a given address family and peering VLAN, as defined in this table: VLAN (MTU)īlackhole announcements tend to be very specific (often /32 for IPv4 and /128 for IPv6) so it is important that as a peer you either accept full length prefixes, or accept full length prefixes when a blackhole next-hop IP address is set. set protocols bgp 339XX address-family ipv4-unicast network 77.X.X.0/24. set policy route-map blackhole rule 10 set community ‘6830:666’. set policy route-map blackhole rule 10 action ‘permit’.
#Bgp blackhole mac#
Any traffic sent to the blackhole MAC address is dropped by the SIX core switches at their edge thus reducing the packet flow toward the target of an attack. set policy route-map IPv4-NET rule 140 match ip address prefix-list ‘IPv4-BGP-OUT’. The SIX provides a blackhole next-hop IP address for each address family and peering VLAN, which resolves to a blackhole MAC address.

Members sometimes need to mitigate against DDoS (Distributed Denial of Service) attacks.
