##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
Inter-domain routing with BGP
Routing across organizations
IGP vs EGP distinction
Trust and policy differences
Defining AS boundaries
Identifying networks globally
The inter-AS routing problem
How BGP differs from IGPs
External and internal BGP
Scaling internal BGP
Establishing peering sessions
Session state machine
Protocol message formats
Route metadata categories
Recording the route's journey
Where to forward traffic
Controlling outbound traffic
Influencing inbound traffic
How the route was learned
How routers choose routes
Walking through a decision
Test your understanding
Controlling what you accept
Practical filtering examples
Tagging routes with metadata
Extended tagging format
Summarizing prefixes
Connecting to multiple providers
Engineering inbound and outbound
Test your understanding
The global view
Why tables keep expanding
Attacks and vulnerabilities
Cryptographic protection
Full path validation
Simplifying peering at IXPs
Debugging internet routing
Common problems and solutions
Test your understanding
Reviewing BGP concepts