---

How to secure BGP sessions using authentication on Quagga

The BGP protocol runs over TCP, and as such, it inherits all the vulnerabilities of a TCP connection. For example, within a BGP session, an attacker may impersonate a legitimate BGP neighbor, and convince the BGP routers on the other end to share their routing information with the attacker.??

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis