That is indeed odd, and a sure bug for me :)
AFAIK, both ebgp-multihop and ttl security should implicitly disable
the connected check.
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_btsh.html
BTW, the document says that it should be set both sides, but I guess
this is only a reminder of the fact that the added security dependes on
both sides to limit the connection.
The only difference between ttl-security and ebgp-multihop is that the
former can prevent an attack from a farther away origin (and the need
for an additional disable-connected-check config for the time being :)
-Carlos
Bob Sinclair @ 7/9/2010 22:25 -0300 dixit:
> Hi John,
>
>
>
> I found a similar thread:
>
>
>
> http://ieoc.com/forums/p/9065/69025.aspx
>
>
>
> It ends with a "fix" of configuring "disable-connected-check" on both
> sides.
>
>
>
> Does that work for you? Not sure why it should!
>
>
>
> The GTSM RFC (http://www.rfc-editor.org/rfc/rfc3682.txt) has this quote:
> "Any directly connected check MUST be disabled for such peerings." Though I
> am not sure if it is relevant here.
>
> HTH,
>
>
>
>
>
> Bob Sinclair CCIE 10427 CCSI 30427
>
> CIERS2 Online Instructor
>
> <http://www.tinyurl.com/ciers2online> www.tinyurl.com/ciers2online
>
>
>
> From: Edward John [mailto:edwardjohn2020_at_googlemail.com]
> Sent: Tuesday, September 07, 2010 7:39 PM
> To: bob_at_bobsinclair.net
> Cc: Narbik Kocharians; shiran guez; Cisco certification
> Subject: Re: BGP - multihop & ttl security
>
>
>
> Hi Bob,
>
>
>
> below is the reachability info between loop back..
>
>
>
> PE1#show ip route 10.1.1.100
>
> Routing entry for 10.1.1.100/32
>
> Known via "isis", distance 115, metric 10, type level-2
>
> Redistributing via isis
>
> Last update from 172.16.111.2 on Serial2/0.100, 01:38:44 ago
>
> Routing Descriptor Blocks:
>
> * 172.16.111.2, from 10.1.1.100, via Serial2/0.100
>
> Route metric is 10, traffic share count is 1
>
>
>
>
>
> PE1#ping 10.1.1.100 so lo 0 re 10
>
>
>
> Type escape sequence to abort.
>
> Sending 10, 100-byte ICMP Echos to 10.1.1.100, timeout is 2 seconds:
>
> Packet sent with a source address of 10.1.1.1
>
> !!!!!!!!!!
>
> Success rate is 100 percent (10/10), round-trip min/avg/max = 4/26/64 ms
>
>
>
>
>
> PE1#show ip bgp | include 10.1.1.100
>
> * 0.0.0.0 10.1.1.100 0 100 200 i
>
> * 101.101.101.0/24 10.1.1.100 0 0 100 i
>
> * 172.16.111.0/24 10.1.1.100 0 0 100 i
>
> * 172.16.113.0/24 10.1.1.100 0 100 200 i
>
>
>
> Regards,
>
> John
>
> No virus found in this incoming message.
> Checked by AVG - www.avg.com
> Version: 9.0.851 / Virus Database: 271.1.1/3118 - Release Date: 09/07/10
> 14:43:00
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
>
>
>
>
>
-- Carlos G Mendioroz <tron_at_huapi.ba.ar> LW7 EQI Argentina Blogs and organic groups at http://www.ccie.netReceived on Wed Sep 08 2010 - 11:59:42 ART
This archive was generated by hypermail 2.2.0 : Fri Oct 01 2010 - 05:58:05 ART