What is a recommended approach to implement prefix filtering to block bogon prefixes?

Master RIPE BGP Security with our comprehensive test. Understand the Border Gateway Protocol, explore multiple choice questions, and get ready for your exam with detailed hints and explanations.

Multiple Choice

What is a recommended approach to implement prefix filtering to block bogon prefixes?

Explanation:
Filtering bogon prefixes works best when you actively control what you accept from peers, using inbound checks to drop unallocated or otherwise invalid prefixes before they enter your routing table. The recommended approach is to create dedicated filters—prefix-lists or route-maps—that enumerate bogon prefixes, then apply them inbound on your BGP sessions with peers. This setup prevents you from learning and installing bogus routes. Keep the filters under active maintenance: monitor announcements and bogon lists, adjust as needed, and respond to changes in legitimate allocations. Strengthen this with RPKI validation, which provides cryptographic proof of prefix origination; combining bogon filtering with RPKI helps reject routes that don’t have valid origin validation, reducing hijacks and misconfiguration risks. In contrast, blocking all prefixes would cut connectivity, filtering only outbound won’t protect you from what you receive, and disabling filtering leaves you exposed to bogus routes.

Filtering bogon prefixes works best when you actively control what you accept from peers, using inbound checks to drop unallocated or otherwise invalid prefixes before they enter your routing table. The recommended approach is to create dedicated filters—prefix-lists or route-maps—that enumerate bogon prefixes, then apply them inbound on your BGP sessions with peers. This setup prevents you from learning and installing bogus routes. Keep the filters under active maintenance: monitor announcements and bogon lists, adjust as needed, and respond to changes in legitimate allocations. Strengthen this with RPKI validation, which provides cryptographic proof of prefix origination; combining bogon filtering with RPKI helps reject routes that don’t have valid origin validation, reducing hijacks and misconfiguration risks. In contrast, blocking all prefixes would cut connectivity, filtering only outbound won’t protect you from what you receive, and disabling filtering leaves you exposed to bogus routes.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy