This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| network_stuff:irr [2017/07/06 16:44] – created jotasandoku | network_stuff:irr [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | __**IRR SANITATION**__ SEE THIS ABOUT[[https:// | ||
| + | \\https:// | ||
| + | This is a [[http:// | ||
| + | * IRR fields (from ripe): | ||
| + | * THESE ARE OBJECTS (big blocks) AND HAVE FIELDS: | ||
| + | |||
| + | For new acquisitions, | ||
| + | * Add field | ||
| + | * Fix the ROE so our ASN is authorized to send those prefixes (this is needed any time we start announcing new subnets (more specific ones)) | ||
| + | * We don't want ISPs to filter our PI between them due to strict IRR prefix filters on their BGP sessions | ||
| + | * from HE: 'A route object for the /24 should suffice as AS200981 is already a member of our AS-SET, AS-HURRICANE.' | ||
| + | * [[http:// | ||
| + | * Issues with the IRR record | ||
| + | * "RPKI status INVALID_ASN strongly indicate a serious problem." | ||
| + | * [[https:// | ||
| + | * Be sure the IRR " | ||
| + | \\ | ||
| + | |||
| + | RPKI NOTES ( RFC6481 ) | ||
| + | * ROA is the set of : prefixes, | ||
| + | * The ' | ||
| + | * we can have hosted solution: the private key of your resource certificate resides on a server hosted by the RIPE NCC and is not retrievable from the secured system. | ||
| + | * or non-hosted solution: open source implementations that allow operators to run Certificate Authority (CA) software that securely interfaces with the RIPE NCC parent system. | ||
| + | * Each association prefix-ASN is linked | ||
| + | * Records of the organisations act as Certification Authorities (CAs) in this PKI. | ||
| + | |||
| + | ---- | ||
| + | |||
| + | |||
| + | |||
| In RIPE | In RIPE | ||
| * RIPE=RIPE NCC | * RIPE=RIPE NCC | ||
| Line 5: | Line 35: | ||
| * Uses Routing Policy Specification Language (RPSL) | * Uses Routing Policy Specification Language (RPSL) | ||
| * route objects: When creating a route object you must authenticate against multiple // | * route objects: When creating a route object you must authenticate against multiple // | ||
| + | |||
| + | ---- | ||
| + | __DOCUMENTING IRR__:\\ | ||
| + | * Be sure each different site subnet (eg: /24) has a route object in IRR, otherwise it might be filtered between ISPs | ||
| + | * Also ASN needs to have its RR ( eg; AS200981 is already a member of our AS-SET, AS-HURRICANE. ) | ||
| + | * And the export/ | ||
| + | * More info here: [[http:// | ||
| + | |||
| + | |||
| + | ---- | ||
| + | |||
| + | * If you cannot update your autnum with an export statement for AS6939 , update peeringdb.com with your AS-SET: Record | ||
| + | |||
| + | |||
| + | |||
| + | https:// | ||
| + | |||