BORDER GATEWAY PROTOCOL Sample Clauses

The Border Gateway Protocol (BGP) clause defines the rules and requirements for the use and management of BGP in network operations. It typically outlines responsibilities for configuring, maintaining, and securing BGP sessions between parties, and may specify standards for route advertisement, filtering, and incident response. This clause ensures reliable and secure routing of data between autonomous systems, helping to prevent misconfigurations or malicious activities that could disrupt network connectivity.
BORDER GATEWAY PROTOCOL. 14.1.1 The following BGP protocol protection functions (without limitation) should be implemented at the stage of project designing: bgp neighbor impersonation attack and resetting transmission control protocol; transmission control protocol session attack using internet control message protocol; bgp session theft attack; route "rocking"; route degradation; unauthorized route announcement; service rejection due to exhausted resources; 14.1.2 Implement secure BGP model including, but not limited to the following: iBGP should not contain synchronization (Internal BGP); disable «Fast external failover» function to prevent route change due to BGP neighbor temporary disruptions in sending «keepalives communication" packets; enable registering change in BGP neighbor status; use soft reconfiguration; use authentication; disable matching BGP versions to accelerate start process; block incoming route updates from fraudulent prefixes; use restriction on the maximum prefix number to avoid inflating Routing Table; use loopback interface for IBGP announcements; disable automatic summation prefix announcements; allow BGP neighbors establishing connection using only port TCP 179; use prefix lists to restrict announcing only selected prefixes.