""Howard C. Berkowitz""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
>
> :-) well, my book on the subject, "Building Service Provider
> Networks," should be about to ship.
>
> Seriously, let's talk about several areas, beginning with BGP.  Every
> BGP scenario I've seen or or heard of in the CCIE context, at best,
> looks at an extremely simple configuration with rules NEVER used in
> the real world.  A few contrasts:

The way Cisco teaches BGP irks me as well.  They just don't cover
anything except the "basics".

> -- in the real world, it's VERY rare to redistribute between a dynamic IGP
>     and BGP. Sure, there are exceptions, but they are VERY carefully
chosen.
>     A provider backbone CANNOT survive having 100,000-plus routes in its
>     IGP, nor should it.

I wouldn't say it's VERY rare.  Take Philip Smiths' NANOG presentation
on Multihoming as an example.  Many Enterprises may want to get "peering
routes or partial routes" and inject them into their IGP.  Many ISP's may
want
to inject their IGP into their BGP for customer static routes (using a
route-map
to filter out all the junk).  I would say this is VERY common.  What's not
common
(and what you are referring to) is redistributing everything (IGP to BGP;
BGP to
IGP) for full routes (the 112,000 routes today).

> -- In provider use, the main purpose of the IGP (or multiple instances of
an
>     IGP) is to maintain connectivity among BGP routers.  You may have a
>     separate IGP instance for each POP or group of POPs.

Next-hop information for BGP, correct.  It holds the "infrastructure
addresses",
and I'm pretty sure you are familiar with this term since I think you
invented it.
So basically, a bunch of routed transit links (/30's or /31's if you can use
them)
and loopback interfaces (/32's) and not much else, if anything else at all.

> -- To connect customers, there is MUCH more use of static and default
routes.
>     You could not possibly run a provider network with the CCIE lab rule
of
>     no statics or defaults.

Service providers typically implement tons of statics and defaults, correct.
Most don't like it, though, and try to design around it for any
alternatives.

> -- AS paths are longer and more complex than you can create with six or
>     so routers.

Most people cannot create/simulate the Internet in their house, very true.

> -- There's a HUGE amount of things to be concerned with that aren't
strictly
>     configuration, such as justifying/obtaining/managing address space,
>     intercarrier relationships involving both economics and cooperative
>     troubleshooting, DNS management, protecting against distributed denial
>     of service, etc.

This stuff is pretty easy, actually.  At least once you start doing it and
getting
your head around the problems.  CCIE doesn't teach ARIN/RIPE/APNIC
justification.  But ARIN's/RIPE's/APNIC's websites teach it pretty well.

The RIR's and IRR's aren't complex, they are just black art (sort of like
DNS
is).  You have to know where to go to get the information, and you can't
just
sit down one day and learn it (well maybe you can).  But there are a lot of
good resources out there on RPSL, etc, that will let you pick this up fairly
quickly.  RFC 2622 and RFC 2650 are a fairly good start.

Learning about Inter-Provider relationships is easy, too, once you get
involved.
The best way, IMO, to get really involved quickly is to start talking to
your
local Exchange Point (EP) people.  They understand these concepts and are
normally willing to share the information very in-depth to any person who
needs
to know.  http://www.ep.net/ for information about your local exchange
points.

As for the other two black-arts, DNS and handling DDoS/DoS, there *are* many
resources out there *and* the IETF has these topics well-defined.  Cisco
doesn't
teach these concepts (at least, not IMO), but they aren't difficult to
learn.  Most
people can just start reading the following list of RFC's and
Internet-Drafts and
understand 99% of what's needed in these two areas:

DNS: RFC 1034 (Updated by RFC1101, RFC1183, RFC1348, RFC1876, RFC1982,
     RFC2065, RFC2181, RFC2308, RFC2535)
DNS: RFC 1035 (Updated by RFC1101, RFC1183, RFC1348,
     RFC1876, RFC1982, RFC1995, RFC1996, RFC2065, RFC2136, RFC2181,
     RFC2137, RFC2308, RFC2535, RFC2845)
DNS:  http://www.ietf.org/ids.by.wg/dnsext.html
http://www.ietf.org/ids.by.wg/dnsop.html
     Internet-Drafts at the above URL's
DNS: http://www.isc.org/products/BIND/ http://www.ultradns.com/
DDoS/DoS: RFC 2196, RFC 2827, RFC 3013, RFC 2979, RFC 1858, RFC 3128
DDoS/DoS: http://packetstorm.dnsi.info/DoS/
http://packetstorm.dnsi.info/distributed/
     Which will require in-depth knowledge of RFC 791, RFC 792, RFC 793, RFC
768
     and/or TCP/IP Illustrated Volume I, and anything else applicable

> -- BGP communities are far more important than in typical scenarios.
>     You need to know why and when to set up your own, learn the values of
>     communities set by other AS and under what circumstances you should
act
>     on them, etc.

There are starting to be a few good resources on BGP communities.  Not
taught
by Cisco, of course, you have to go to NANOG for things like this.  Dan
Golding
has given a few talks (one on Confederations that had a lot of material
covering
BGP communities, and another at the last NANOG24 specifically on topic).

To be honest, I am going to give Cisco some credit, because the tutorials
that
Philip Smith and Barry Greene have up on
http://www.cisco.com/public/cons/isp/
do talk fairly well to BGP communities concepts.  However, this is not
material
being taught in the Cisco certified (CCNA, CCNP, CCIE, et al) learning
process.

The IETF has not documented these BGP communities well either.  After you
read
RFC 1998, you're like "ok, so how do implement communities, and why did I
read
this?".  There are hidden pieces in internet-drafts (some expired, some
current) and
you have to go looking for them.  Actually, to learn almost anything at this
level, some
of the only places to go for this type of information are expired
internet-drafts and old
archives of mailing-lists like NANOG.  Here are the best resources for
learning about
organization of network resources, and it takes a lot of reading and a lot
of thinking:
http://www.watersprings.org/ (do a search for keywords on experimental
I-D's)
http://www.nanog.org/ (go into the old meetings and presentations, links,
and archives)

> -- You may be dealing literally thousands of routers in your own network,
>     interconnected with thousands of enterprise networks. You may also
have
>     a complex ATM, SONET, MPLS, or other intelligent sub-IP technology
that
>     must coordinate with the IP.

Sub-IP is also not covered by Cisco as well as it should.  ATM is covered,
but not
required for CCNA (only CCNA-WAN) or even any of the other certifications.
Plus ATM is going the way of the do-do for large backbones anyways.  Knowing
ATM used to make you top-notch in the backbone, now it makes you
niche-market
in the access layer.

SONET and WDM are even bigger today than MPLS.  Knowing O-E/E-O layers,
SONET layers (including GR-253-CORE, BLSR, UPSR), C/L/S bands, etc is
being taught by Cisco, but not for the regular certification tracks.  Even
Gigabit
Ethernet and Metro Ethernet and SONET muxed Ethernet (Optical Ethernet)
isn't
very well taught.  These are very critical areas for the backbones of today
and
tomorrow.

I think MPLS is still niche, like ATM, but it's better to know it when you
are going
to need it.  Cisco all but invented MPLS as Tag-Switching, and they have the
resources, *and* it *is* becoming a big part of their future certification
curriculum.

> -- There's a different viewpoint on convergence.  It's generally accepted
>     among large providers and researchers that the worldwide "BGP table"
>     never truly converges -- changes come too fast. We have to work in
that
>     environment.

But you can "sort of" find out what's changed and what hasn't changed.  One
way to look at the churn is to do a "show ip route | i , 00:00" every minute
(shows you routes that have converged in the past minute).  Another would
be to collect dumps of the routing table and/or BGP table in intervals and
compare them Unix "diff"-style.  You can then make comparisons against
the rest of the BGP table (like AS-paths) and/or SNMP IF-MIB-like data
to find out what changed where (and possibly why).

> -- Customers frequently multihome in ways that require coordinating
between
>     their providers, even when those providers are competitors.

Back to the IRR/RPSL concepts, ISP's do filter.  PA space is becoming less
and less useful for multhoming purposes -- in Europe, ISP's only allow RIPE
PI space generally and won't do the PA space multihoming like US ISP's do.

Smart people in this day-and-age that are would-be users of PA space instead
opt into different strategies like conditional advertisement or Doyle Volume
II's
section of the book on Multihoming NAT.  But there aren't many smart people
in this day-and-age.

> -- As opposed to an enterprise network where SOMEBODY is in control, the
>     provider space involves cooperative anarchy.  One AS fouling up its
>     configuration can and has had worldwide effects.

A lot of this stuff has been, is, and will be covered by Caida and Nanog.
DNS, BGP, DoS, etc -- "global instabilities" are very interesting problems.

What do you do when someone starts using YOUR AS NUMBER?
What do you do when someone starts annoucing YOUR NETBLOCK?
What do you do when someone sends a million bogus requests to the
 root name-servers every few seconds?
What will the next Nimda, Red Alert, Internet Worm, etc .. look like?
Etc.

These are questions that most network engineers rarely ask themselves.
And these are topics that aren't taught by Cisco, per se.  At least not in
the core curriculum.

> These are just a start.  There are other people that can comment on
> some of the differences.  Peter van Oene (yes, I'm volunteering you)
> is one with lots of good experience.  There are others, and this
> actually might be an interesting thread.

I think it's a great thread.  Thanks for your input, Howard.

-dre




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=44768&t=44768
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to