Home page logo
/

nanog logo nanog mailing list archives

Re: BGP Session Teardown due to AS_CONFED_SEQUENCE in AS4_PATH
From: Rob Shakir <rjs () eng gxn net>
Date: Tue, 20 Jan 2009 14:33:14 +0000

On Tue, Jan 20, 2009 at 01:01:03PM +0100, Mikael Abrahamsson wrote:
have been able to demonstrate that a device running Cisco IOS release  
12.0(32)S12 behaves as per this description.

Has anyone looked into IOS XR behaviour, if it's the same as 12.0(32)S12?

Mikael,

Pierfrancesco Caci was kind enough to provide me with some output from an XR
box. It appears that IOS XR behaves in the same manner as Force10, and JunOS,
whereby the session is not torn down, and the path is installed, albeit with a
munged AS_PATH. The output below is for the prefix from 196629 which we
originally analysed:

Path #1: Received by speaker 0
   3356 35320 3.21 23456

Given that XR box is an AS4-speaker, one would not expect to see 23456 in the
AS_PATH, the prescence of this AS seems to be a symptom of the bug (and again
occurs on Juniper/Force10).

Kind regards,
Rob

--
Rob Shakir                      <rjs () eng gxn net>
Network Development Engineer    GX Networks/Vialtus Solutions
ddi: +44208 587 6077            mob: +44797 155 4098
pgp: 0xc07e6deb                 nic-hdl: RJS-RIPE

This email is subject to: http//www.vialtus.com/disclaimer.html




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]