{"id":45,"date":"2005-12-09T17:53:41","date_gmt":"2005-12-09T16:53:41","guid":{"rendered":"http:\/\/wp.security-planet.de\/?p=5"},"modified":"2005-12-09T17:53:41","modified_gmt":"2005-12-09T16:53:41","slug":"cisco-bgp","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2005\/12\/09\/cisco-bgp\/","title":{"rendered":"Cisco BGP"},"content":{"rendered":"<p>weitergehende Informationen f\u00fcr die Teilnehmer des Cisco Kurses CI-BGP<!--more--><\/p>\n<p><strong>Links<\/strong><\/p>\n<p>Die Cisco Online Dokumentation:<br \/>\n<a href=\"http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/software\/ios124\/124cg\/hirp_c\/ch05\/index.htm\">Configuration-Guide 12.4<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/software\/ios124\/124cr\/hirp_r\/rte_bgh1.htm\">Command-Referenz 12.4 A-I<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/software\/ios124\/124cr\/hirp_r\/rte_bgh2.htm\">Command-Referenz 12.4 M-Se<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/product\/software\/ios124\/124cr\/hirp_r\/rte_bgh3.htm\">Command-Referenz 12.4 Sh-T<\/a><\/p>\n<p><a href=\"http:\/\/www.cymru.com\/BGP\/index.html\">The Team Cymru BGP Data Page<\/a><br \/>\nHier gibt es das Secure-BGP-Template (unbedingt lesen!!!) und eine Liste diverser per Telnet erreichbarer Router f\u00fcr BGP-Abfragen.<\/p>\n<p><a href=\"http:\/\/bgp.potaroo.net\/\">BGP-Reports<\/a><br \/>\n<a href=\"http:\/\/www.de-cix.net\/stats\/\">DE-CIX-Statistiken<\/a><br \/>\n<a href=\"http:\/\/lg.de-cix.net\/cgi-bin\/index.cgi\">DE-CIX Looking-Glass<\/a><br \/>\n<a href=\"http:\/\/www.nanog.org\/\">NANOG<\/a><br \/>\nBei der &#8220;North American Network Operators&#8217; Group&#8221; gibt es viele Dokumente zum Netz-Betrieb auf SP-Ebene.<\/p>\n<p><strong>BGP-Artikel aus dem Internet Protocol Journal<\/strong><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_8-3\/ipv4.html\">IPJ 8\/3 &#8211; A Pragmatic Report on IPv4 Address Space Consumption<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_8-2\/graph_overlays.html\">IPJ 8\/2 &#8211; Graph Overlays on Path Vector: A Possible Next Step in BGP<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_6-4\/ipv4.html\">IPJ 6\/4 &#8211; IPv4: How long do we have?<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/ac174\/ac236\/about_cisco_ipj_archive_article09186a00801c5a98.html\">IPJ 6\/3 &#8211; Securing BGP: S-BGP<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/ac174\/ac236\/about_cisco_ipj_archive_article09186a00801c5a9b.html\">IPJ 6\/3 &#8211; Securing BGP: soBGP<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/ac174\/ac235\/about_cisco_ipj_archive_article09186a00801a0cc0.html\">IPJ 6\/2 &#8211; BGP Communities<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/ac174\/ac183\/about_cisco_ipj_archive_article09186a00800c8409.html\">IPJ 4\/4 &#8211; Scaling Inter-Domain Routing<\/a><br \/>\n<a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/ac174\/ac176\/about_cisco_ipj_archive_article09186a00800c83cc.html\">IPJ 4\/1 &#8211; The BGP Routing Table<\/a><\/p>\n<p><strong>RFCs:<\/strong><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc3065.txt\">Autonomous System Confederations for BGP<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2918.txt\">Route Refresh Capability for BGP-4<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2842.txt\">Capabilities Advertisement with BGP-4<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2858.txt\">Multiprotocol Extensions for BGP-4<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2796.txt\">BGP Route Reflection &#8211; An alternative to full mesh IBGP<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2439.txt\">BGP Route Flap Damping<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2385.txt\">Protection of BGP Sessions via the TCP MD5 Signature Option<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc2042.txt\">Registering New BGP Attribute Types<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc1998.txt\">An Application of the BGP Community Attribute in Multi-home Routing<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc1774.txt\">BGP-4 Protocol Analysis<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc1773.txt\">Experience with the BGP-4 protocol<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc1772.txt\">Application of the Border Gateway Protocol in the Internet<\/a><br \/>\n<a href=\"http:\/\/www.lan2wan.de\/rfc\/rfc1771.txt\">A Border Gateway Protocol 4 (BGP-4)<\/a><\/p>\n<p><strong>Buchempfehlungen zum Thema:<\/strong><br \/>\nB\u00fccher zuBGP gibt es nat\u00fcrlich auch wie Sand am Meer. Empfehlen kann ich folgende B\u00fccher.<\/p>\n<p><a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/0321127005\/lan2wan-21\">Russ White, Danny McPherson, Srihari Sangli: Practical BGP<\/a><br \/>\nMit gut 400 Seiten ein fast \u00fcbersichtliches Buch. Es behandelt aber alle relevanten BGP-Techniken und noch ein bi\u00dfchen mehr. Absolut empfehlenswert!<\/p>\n<p><a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/157870233X\/lan2wan-21\">Bassam Halabi, Danny McPherson: Internet Routing Architectures<\/a><br \/>\nEin echter Klassiker, aber halt von 2000 und damit schon etwas angestaubt. Damals aber eines der besten BGP-B\u00fccher schlechthin! Achtung: Nie nicht niemals die deutsche Version kaufen!!! Die \u00dcbersetzung ist so schlecht, da\u00df man nach dem Lesen alles was man schon verstanden hat nicht mehr kapiert.<\/p>\n<p><a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/158705017X\/lan2wan-21\">William R. Parkhurst: Cisco BGP-4 Command and Configuration Handbook<\/a><br \/>\nAuch schon etwas angestaubt (2001), aber die damals aktuellen BGP-Befehle sind sehr sch\u00f6n kommentiert und in einer Art und Weise erkl\u00e4rt, die \u00fcber die Cisco Command-Referenz hinausgeht.<\/p>\n<p><a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/0321127005\/lan2wan-21\"><img decoding=\"async\" src=\"http:\/\/images-eu.amazon.com\/images\/P\/0321127005.01.MZZZZZZZ.jpg\" style=\"border:0 none;vertical-align:middle;\" \/><\/a> <a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/157870233X\/lan2wan-21\"><img decoding=\"async\" src=\"http:\/\/images-eu.amazon.com\/images\/P\/157870233X.01.MZZZZZZZ.jpg\" style=\"border:0 none;vertical-align:middle;\" \/><\/a> <a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/158705017X\/lan2wan-21\"><img decoding=\"async\" src=\"http:\/\/images-eu.amazon.com\/images\/P\/158705017X.03.MZZZZZZZ.jpg\" style=\"border:0 none;vertical-align:middle;\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.amazon.de\/exec\/obidos\/ASIN\/0684832674\/lan2wan-21\">Where Wizards Stay Up Late<\/a><br \/>\nDieses ist kein technisches Buch zu BGP, es erz\u00e4hlt die Geschichte der Entstehung des Internets. Von den ganz fr\u00fchen ersten Gedanken eines umspannenden Netzes, \u00fcber die Menschen die diese vision\u00e4re Idee umgesetzt haben bis zu dem was wir heute das Internet nennen ist die Entstehung dokumentiert. Sehr lesenswert.<br \/>\n<img decoding=\"async\" src=\"http:\/\/images-eu.amazon.com\/images\/P\/0684832674.03._BO01,224,223,220_PIsitb-dp-arrow,TopRight,22,-21_SH30_SCMZZZZZZZ_.jpg\" style=\"border:0 none;vertical-align:middle;\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>weitergehende Informationen f\u00fcr die Teilnehmer des Cisco Kurses CI-BGP<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[5,8],"tags":[138],"class_list":["post-45","post","type-post","status-publish","format-standard","hentry","category-cisco","category-cisco-training","tag-cisco-bgp"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}