Publications
Withdrawn on December 17, 2019.
Border Gateway Protocol (BGP) Security
Documentation
Topics
Date Published: July 2007
Author(s)
Shirley Radack (NIST)
The Border Gateway Protocol (BGP) plays a critical role in the effective operation of the Internet. BGP is used to update routing information between major systems, which makes it possible for systems connected to the Internet to receive and transmit traffic correctly. Because BGP performs a vital task in keeping the Internet running smoothly, the security of BGP routers is a high priority concern for organizations. This bulletin explains the structure and the functions of BGP in terms that will enable those who are not familiar with the protocol to understand its use. The bulletin also provides an overview of risks and attacks against BGP, possible countermeasures, and technical major recommendations for improving BGP security.
The Border Gateway Protocol (BGP) plays a critical role in the effective operation of the Internet. BGP is used to update routing information between major systems, which makes it possible for systems connected to the Internet to receive and transmit traffic correctly. Because BGP performs a vital...
See full abstract
The Border Gateway Protocol (BGP) plays a critical role in the effective operation of the Internet. BGP is used to update routing information between major systems, which makes it possible for systems connected to the Internet to receive and transmit traffic correctly. Because BGP performs a vital task in keeping the Internet running smoothly, the security of BGP routers is a high priority concern for organizations. This bulletin explains the structure and the functions of BGP in terms that will enable those who are not familiar with the protocol to understand its use. The bulletin also provides an overview of risks and attacks against BGP, possible countermeasures, and technical major recommendations for improving BGP security.
Hide full abstract
Keywords
Border Gateway Protocol (BGP); Internet security; networking; routing
Control Families
Configuration Management; Planning; System and Communications Protection