On 2/27/2013 7:45 PM, Jon Lewis wrote:
On Wed, 27 Feb 2013, Jay Hennigan wrote:

You could simplify that to:

ip as-path access-list 10 deny _11xx1_
ip as-path access-list 10 permit .*   <- Dangerous outbound to transit
connections.

Or simplify things more by using prefix filters / route-maps on the customer BGP sessions to deny/accept+tag routes with communities that tell the rest of your network what to do with the routes (i.e. whether a route gets advertised to your transit providers, etc.). That ends up being much saner as you have smaller filters in more places rather than monster filters at the border where you'll lose track of why things are there.


I do have filters on the customer BGP sessions, but I have to disallow his AS from my upstreams, or I become a transit for those routes.

--
Jerry Bacon
Senior Network Engineer

_______________________________________________
cisco-nsp mailing list  [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to