On Thu, 15 Oct 2020 at 10:28, Ryan Hamel <ryan@rkhtech.org> wrote:
> My experience with multiple carriers is that reroutes happen in under a minute but rarely happen, I also have redundant backup circuits to another datacenter, so no traffic is truly lost. If an outage lasts longer than 5 minutes, or it's flapping very frequently, then I call the carrier. Last mile carriers install CPE equipment at the sites, which makes BFD a requirement to account for the fiber uplink on it going down, or an issue upstream.
I think I may have spoken ambiguously and confusingly based on that
statement. Rerouting inside operator network, such as their LSR-LSR
link dropping is ostensibly invisible to the customer, can be tens of
milliseconds outage can be 10s outage.
Do you want your martini emulated backbone link to fail when operator
reroutes their own LSR-LSR link failure?
> As for security vulnerabilities, none can be leveraged if they are using internal IPs, and if not, a quick ACL can drop BFD traffic from unknown sources the same way BGP sessions are filtered.
> In Juniper speak, the ACL would look like:
> term deny_bfd {
> from {
> protocol udp;
> destination-port [ 3784 3785 4784 ];
> }
> then discard;
So you're dropping in every edge all UDP packets towards these three
ports? Your customers may not appreciate.
--
++ytti