Had this before, just to add to Marko's comments I had to configure the 
following for this to work:

tcp-map BGP-MD5
  tcp-options range 19 19 allow    
 
class-map BGP-MD5
  match port tcp eq 179
 
policy-map global_policy
  class BGP-MD5
    set connection advanced-options BGP-MD5
    set connection random-sequence-number disable

--
BR

Tony

Sent from my iPad

> On 27 Feb 2014, at 14:00, "Ryanlk18 ." <[email protected]> wrote:
> 
> Some food for thought, I would avoid TTL security unless specifically asked
> to use it (or in cisco's round about way of asking to use it).  If you are
> asked to "Secure your BGP Session" then just use authentication.  TTL
> security is pretty straight forward, but requires you to know the exact hop
> count of the underlying IGP to your destination.  If you are off by 1, then
> no dice.
> 
> In the lab, probably not a big deal.  In the real world, it can sometimes
> be a bit more tricky.
> 
> One other thing about BGP authentication, in case anyone is interested.  I
> was having a problem with BGP authentication going through an ASA.
> Although the ASA was configured to allow all traffic through, when I
> enabled authentication, BGP would drop.  The debug told me the problem was
> with the password.  After a little goole'ing, I found that the ASA was
> changing the MD5 on the authentication packets, causing my authentication
> to fail.  To fix this you have to go in and tell the ASA to leave the BGP
> authentication packets alone.
> 
> Here is a good article describing how to set it up.
> 
> https://supportforums.cisco.com/docs/DOC-21347
> 
> V/r,
> 
> Ryan Krcelic
> 
> 
> 
> On Thu, Feb 27, 2014 at 8:51 AM, Christopher Lemish <
> [email protected]> wrote:
> 
>> Thanks guys!
>> 
>> Thank you,
>> Chris
>> 
>> 
>> 
>> 
>> -----Original Message-----
>> From: [email protected] [mailto:
>> [email protected]] On Behalf Of Bob McCouch
>> Sent: Wednesday, February 26, 2014 7:36 PM
>> To: Marko Milivojevic
>> Cc: OSL CCIE ([email protected])
>> Subject: Re: [OSL | CCIE_RS] BGP: TTL Security
>> 
>> I think the issue is exactly what Marko mentions in #1 & 2:
>> 
>> 1) The TTL is set to 255, instead of 1 (default)
>> 2) TTL security feature needs to be turned on on both sides
>> 
>> If you were to only enable TTL security on one side, it would need "hops
>> 254" because the other EBGP peer will send its packets with TTL 1, the
>> default for EBGP sessions. You need to enable it on both sides for it to
>> work correctly by setting the TTL to 255 and then subtracting only the
>> expected number of hops. After all, spoofing a packet that lands on your
>> router with a TTL 1 is not too hard. But spoofing a packet that lands on
>> your router with a TTL of 254 would be quite a feat if you're not on the
>> same wire.
>> 
>> Best,
>> Bob
>> CCIE #38296
>> HerdingPackets.net
>> 
>> 
>> On Wed, Feb 26, 2014 at 3:41 PM, Marko Milivojevic <[email protected]
>>> wrote:
>> 
>>> I can confirm (and so can you in the lab environment).
>>> 
>>> When configured with the ttl-security, several things are important
>>> for the eBGP neighbors:
>>> 
>>> 1) The TTL is set to 255, instead of 1 (default)
>>> 2) TTL security feature needs to be turned on on both sides
>>> 3) TTL of the incoming packet will be matched against the configured
>>> hop count using a simple check: (255-Packet_TTL) <= hops
>>> 
>>> Let's take a look.
>>> 
>>> (AS65001)R1[Gi1]---{192.168.12.0/24}---[Gi1]R2(AS65002)
>>> 
>>> 
>>> R1:
>>> interface GigabitEthernet1
>>> ip address 192.168.12.1 255.255.255.0 !
>>> router bgp 65001
>>> neighbor 192.168.12.2 remote-as 65002  neighbor 192.168.12.2
>>> ttl-security hops 2  !
>>> address-family ipv4
>>>  neighbor 192.168.12.2 activate
>>> !
>>> 
>>> R2:
>>> interface GigabitEthernet1
>>> ip address 192.168.12.2 255.255.255.0 !
>>> router bgp 65001
>>> neighbor 192.168.12.1 remote-as 65001  neighbor 192.168.12.1
>>> ttl-security hops 2  !
>>> address-family ipv4
>>>  neighbor 192.168.12.1 activate
>>> !
>>> 
>>> R1:
>>> R1#show bgp ipv4 unicast summary
>>> BGP router identifier 192.168.12.1, local AS number 65001 BGP table
>>> version is 1, main routing table version 1
>>> 
>>> Neighbor        V           AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down
>>> State/PfxRcd
>>> 192.168.12.2    4        65002       7       7        1    0    0
>> 00:04:15
>>>       0
>>> 
>>> So, the session is up, even though they're directly connected (proving
>>> the point of the TTL statement above). But what WAS the actual TTL
>>> used on the wire? See for yourself - this is the SYN packet for that
>> session.
>>> 
>>> Frame 1: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
>>> Ethernet II, Src: 00:0c:29:84:d3:2e (00:0c:29:84:d3:2e), Dst:
>>> 00:50:56:92:37:3d (00:50:56:92:37:3d)
>>> Internet Protocol Version 4, Src: 192.168.12.1 (192.168.12.1), Dst:
>>> 192.168.12.2 (192.168.12.2)
>>>    Version: 4
>>>    Header length: 20 bytes
>>>    Differentiated Services Field: 0xc0 (DSCP 0x30: Class Selector 6;
>> ECN:
>>> 0x00: Not-ECT (Not ECN-Capable Transport))
>>>    Total Length: 44
>>>    Identification: 0xa870 (43120)
>>>    Flags: 0x02 (Don't Fragment)
>>>    Fragment offset: 0
>>>    Time to live: 255
>>>    Protocol: TCP (6)
>>>    Header checksum: 0x3947 [correct]
>>>    Source: 192.168.12.1 (192.168.12.1)
>>>    Destination: 192.168.12.2 (192.168.12.2) Transmission Control
>>> Protocol, Src Port: 51300 (51300), Dst Port: bgp (179), Seq: 0, Len: 0
>>> 
>>> --
>>> Marko Milivojevic - CCIE #18427 (SP R&S) Senior CCIE Instructor /
>>> Managing Partner - iPexpert
>>> :: Free Video Training: http://youtube.com/iPexpertInc
>>> :: Social: http://twitter.com/@icemarkom | http://fb.me/ccie18427
>>> :: iPexpert: http://www.ipexpert.com/Communities | +1-810-326-1444
>>> 
>>> 
>>> 
>>> On Wed, Feb 26, 2014 at 12:19 PM, Edgar Díaz Orellana <
>>> [email protected]> wrote:
>>> 
>>>> In fact using an loopback interface is kind of had a second hop, 1
>>>> of
>>> them
>>>> is external the other is internal thru control-plane.
>>>> 
>>>> That's why need to use 2 hops if you had neighbors peering thru
>>>> loopbacks
>>>> 
>>>> Sent from my iPhone
>>>> 
>>>>> On 26-02-2014, at 14:09, marc abel <[email protected]> wrote:
>>>>> 
>>>>> Are you peering between loopbacks? In this case you would need to
>>>>> do ttl-security hops 2. Your neighbor is going to decrement 1 ttl
>>>>> before sending and then local router would decrement 1 before
>>>>> delivering to loopback interface. This probably wouldn't show up
>>>>> in your traceroute,
>>>> but
>>>>> you would have a ttl of 253.
>>>>> 
>>>>> 
>>>>> On Wed, Feb 26, 2014 at 10:22 AM, Christopher Lemish <
>>>>> [email protected]> wrote:
>>>>> 
>>>>>> Guys,
>>>>>> 
>>>>>> I just turned up a BGP session for a customer (doing BGP Failover
>>>>>> for them).  I am using the "neigh ttl-security hops" cmd.  A
>>>>>> traceroute confirms it is 1 hop away.  The Cisco documentation
>>>>>> explains that if a
>>>> TTL
>>>>>> is received that equals the TTL value expected or is higher, the
>>> router
>>>>>> will accept that packet.
>>>>>> 
>>>>>> I was troubleshooting it quickly and the cmd "neigh x.x.x.x
>>> ttl-security
>>>>>> hops 254" is the only hop count that maintains the BGP session.
>>>>>> I
>>>> thought
>>>>>> I recall that the ttl-security cmd "must exactly" match the
>>>>>> number of
>>>> hops
>>>>>> away from one of Joe's videos.  But, I thought we could use the
>>>>>> "neigh x.x.x.x ttl-security hops 1" which means it is 1 hop away
>>>>>> and would
>>>> accept
>>>>>> a TTL of 254 or higher, indicating that it is 1 hop away.
>>>>>> 
>>>>>> (TTL=255)-->(TTL=254)
>>>>>>      PE--------CE
>>>>>> 
>>>>>> The IOS version of this 3925 is the following:
>>>>>> Cisco IOS Software, C3900 Software (C3900-UNIVERSALK9-M), Version
>>>>>> 15.2(4)M5, RELEASE SOFTWARE (fc2)
>>>>>> 
>>>>>> Thank you,
>>>>>> Chris
>>>>>> 
>>>>>> _______________________________________________
>>>>>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security
>>>>>> Videos
>>> ::
>>>>>> 
>>>>>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>>>>> 
>>>>> 
>>>>> 
>>>>> --
>>>>> Marc Abel
>>>>> CCIE #35470
>>>>> (Routing and Switching)
>>>>> _______________________________________________
>>>>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security
>>>>> Videos
>>> ::
>>>>> 
>>>>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>>>> _______________________________________________
>>>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos
>> ::
>>>> 
>>>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>>> _______________________________________________
>>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
>>> 
>>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>> _______________________________________________
>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
>> 
>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>> _______________________________________________
>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
>> 
>> iPexpert on YouTube: www.youtube.com/ipexpertinc
> _______________________________________________
> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
> 
> iPexpert on YouTube: www.youtube.com/ipexpertinc
_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc

Reply via email to