Sorry for the top post... Seems phone vendors haven't figured out how to create 
a decent email editor on a phone yet.

When I worked at Arbor, we always recommended that customers would front end 
anything maintaining state (i.e. a SFW) with something that didn't (i.e. a 
Router) and to use Stateless ACLs to allow through only that which was 
absolutely required in order to allow stateful devices  further downstream to 
perform their duties more efficiently.

Then customers buy something like a Juniper SRX in an attempt to collapse their 
network (routing & firewalling) and believe that they are now back to front 
ending everything with a stateful device.

The beauty of the SRX device is that while it is a stateful device, traffic 
arriving on interfaces can still be processed by stateless FFs which get 
processed before handing it off to the the stateful FW module and consuming 
precious recources on the SPCs.

So by all means, collapse your network if you need to, use a single box for 
routing and firewall if your design warrants it, but make sure you still use 
common sense and deploy it in a manner that is consistent with best current 
practices and will safeguard your network without itself becoming a bottleneck.

Stefan Fouant
GPG Key ID: 0xB4C956EC

Sent from my HTC EVO.

----- Reply message -----
From: "joel jaeggli" <[email protected]>
Date: Sat, Jun 23, 2012 12:39 am
Subject: [j-nsp] Whats the best way to announce an IP range in BGP? Doesn't 
physically exist anywhere.
To: "Morgan Mclean" <[email protected]>
Cc: "[email protected]" <[email protected]>


On 6/22/12 9:49 AM, Morgan Mclean wrote:
> This is exactly what happened. The session table filled up. One of our 
> security guys took down our edge 650 cluster from a single unix box out on 
> the net.
This is what happens when you use a stateful box for an internet router.

a  router with a covering aggreate and some knowledge of the more 
specifc on the interior would inexpensively discard traffic bound for 
unreachable destinations.
>
> Sent from my iPhone
>
> On Jun 22, 2012, at 4:39 AM, "Scott T. Cameron" <[email protected]> wrote:
>
>> On Wed, Jun 20, 2012 at 10:14 PM, Morgan McLean <[email protected]> wrote:
>>
>>> I have a /24 I want to announce, but I don't actually have it anywhere on
>>> the network. I NAT some of its IP's on the SRX that has the BGP session
>>> with our providers.
>>>
>>> I've been using static routes with the discard flag, but I don't really
>>> like the way the SRX handles traffic. It still creates sessions for traffic
>>> destined to IP's not used anywhere (hitting the static route) and can be
>>> easily dos'd because of this.
>>>
>>> Is there a better way to just tell our providers hey, we have this range?
>>>
>>>
>> It sounds like you're using the SRX as an edge router with a BGP session
>> upstream?
>>
>> I don't have this architecture here, but I had the same problem.  I had my
>> edge router announce the /24 to the BGP upstreams, and my SRX announce the
>> /24 via OSPF to the MX.
>>
>> Unfortunately, one of my IPs was hammered, and filled up the session table
>> with invalid sessions.  That's the real issue, at least in my case, was
>> that even invalid sessions were taking a session, and prohibiting
>> legitimate traffic from flowing.
>>
>> The solution was only to announce from SRX to MX (edge router) the /32s
>> that were actually in use.
>>
>> I suppose that a firewall filter may help on your ingress ports to only
>> permit the traffic to the /32s that are actually in use, but I can't say
>> from experience if this will happen before a session is created, even in
>> invalid state.
>>
>> Scott
>> _______________________________________________
>> juniper-nsp mailing list [email protected]
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
> _______________________________________________
> juniper-nsp mailing list [email protected]
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>

_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp
_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to