Internet Exchanges (IX) play an important “efficiency” role in the practical matter of physically connecting the networks that comprise the Internet. IXs are facilities that provide space, power and connectivity to member networks—typically Internet Service Providers (ISPs), telecom, cable and mobile carriers, content providers, web enterprises and sophisticated enterprises such…
In past blogs, we’ve explored how you can alert for and diagnose BGP route leaks and hijacks. Route leaks and hijacks—routing events where illegitimate prefixes are wrongly propagated through the Internet—are notoriously difficult to troubleshoot and have the potential to bring down entire swaths of the Internet.
In past blogs, we’ve explored a specific BGP issue that can have far-reaching, large-scale impacts on networks across the Internet: route leaks and hijackings. In this post, we’ll discuss alerting for leaks and hijacks, which is the first step in the process of detecting, diagnosing and ultimately mitigating these notoriously…
There have been a number of high profile routing leaks in the past few weeks. So today we’re going to review several of these leaks in detail to understand how the work, how you can detect them and how you can determine their severity. Our examples cover the Google /…
In several previous blogs (4 Real BGP Troubleshooting Scenarios and Solving BGP AS Path Prepending Errors) we’ve highlighted the ThousandEyes platform’s ability to visualize and analyze BGP issues and their impact. In this blog post we’d like to discuss how BGP alerts within the platform can proactively inform you of…