-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Addition of MikroTik guide and updated README.md
The MikroTik guide on ROV implementation has been created, and the amendment to the README.md file to reflect that route validation enables an operator to reject routes instead of either rejecting or setting a lower preference per the IETF draft "Guidance to Avoid Carrying RPKI Validation States in Transitive BGP Path Attributes" (https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-avoid-rpki-state-in-bgp) as well as the intro of an Acknowledgements section.
- Loading branch information
1 parent
150dc49
commit 51fa62e
Showing
3 changed files
with
45 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,12 +4,16 @@ rpkihub.au is a site designed to help network operators deploy Route Origin Auth | |
|
||
It will detail the steps to publish Route Origin Authorisations (ROAs) with the five Regional Internet Registries (APNIC, ARIN, RIPE NCC, LACNIC and AFRINIC) which is the most common method. It will also detail how to install, setup and configure Krill from NLnet Labs (https://nlnetlabs.nl/projects/routing/krill/) for the more advanced users who may wish to manage their own RPKI Certificate Authority. | ||
|
||
The site will also go into detail about configuring Route Object Validation (ROV) on your BGP sessions to validate ROAs using Relying Party (RP) software. This component is important as it enables you to either reject or set a lower preference on the routes for which the origin Autonomous System Number (ASN) has not been authorised. | ||
The site will also go into detail about configuring Route Object Validation (ROV) on your BGP sessions to validate ROAs using Relying Party (RP) software. This component is important as it enables you to reject routes for which the origin Autonomous System Number (ASN) has not been authorised. | ||
|
||
Eventually, I will also go into detail on how to install and configure RPKI Relying Party (RP) software for your network to use to validate ROAs. | ||
|
||
This site is still a work in progress, and has a long way to go. There are many different hardware vendors, many different configuration options, and many different ways to achieve this. I will do my best to capture them all where possible however, it is only possible with the support of the community. If you do wish to support this work through creating a how-to for a specific vendor, open a pull request. If you have access to hardware on which configurations can be tested, either drop me an email to [email protected] or reach out to me on Discord at "thesysadmin" (no quotes). | ||
|
||
Thanks for your support, hope this helps, and would love to hear if and how this has helped you! | ||
|
||
\- Christopher Hawker | ||
\- Christopher Hawker | ||
|
||
## Acknowledgements | ||
|
||
- [Job Snijders](https://datatracker.ietf.org/person/[email protected]) - He has provided some valuable insight and information which would have taken me quite some time to pick up on and introduce. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.