What is the purpose of max-prefix limits on BGP sessions and how should you set them?

Master RIPE BGP Security with our comprehensive test. Understand the Border Gateway Protocol, explore multiple choice questions, and get ready for your exam with detailed hints and explanations.

Multiple Choice

What is the purpose of max-prefix limits on BGP sessions and how should you set them?

Explanation:
Max-prefix limits act as a safety guardrail for BGP sessions. They cap how many prefixes a neighbor can advertise to you, protecting the router from memory exhaustion and high CPU load if a peer floods the session with routes, whether due to churn, misconfiguration, or a sudden surge. When the configured limit is reached, the router typically stops accepting more prefixes from that neighbor or resets the session, which is a controlled reaction that prevents resource exhaustion and instability across the routing table. The best practice is to set the limit to a reasonable multiple of what you expect from that neighbor under normal operation, with some headroom for growth and temporary spikes. Apply this per session and per address family (IPv4 and IPv6) based on actual traffic and hardware capacity. The other options aren’t appropriate because the feature isn’t about limiting the number of peers, nor is it limited to IPv6 prefixes only, nor is it about blocking all updates entirely; it’s about preventing unbounded growth of accepted routes.

Max-prefix limits act as a safety guardrail for BGP sessions. They cap how many prefixes a neighbor can advertise to you, protecting the router from memory exhaustion and high CPU load if a peer floods the session with routes, whether due to churn, misconfiguration, or a sudden surge. When the configured limit is reached, the router typically stops accepting more prefixes from that neighbor or resets the session, which is a controlled reaction that prevents resource exhaustion and instability across the routing table. The best practice is to set the limit to a reasonable multiple of what you expect from that neighbor under normal operation, with some headroom for growth and temporary spikes. Apply this per session and per address family (IPv4 and IPv6) based on actual traffic and hardware capacity. The other options aren’t appropriate because the feature isn’t about limiting the number of peers, nor is it limited to IPv6 prefixes only, nor is it about blocking all updates entirely; it’s about preventing unbounded growth of accepted routes.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy