LogicMonitor + Catchpoint: Enter the New Era of Autonomous IT

Learn more

Monitor your BGP routing from the edge out.

LogicMonitor provides network teams with distributed BGP monitoring across their infrastructure, detecting route changes, propagation issues, and anomalies from the outside in before users report problems.

What are the most important BGP routing best practices?

The most critical BGP routing best practices include: monitoring reachability from distributed edge vantage points (not just internal routers), enforcing strict prefix filters on all peering sessions to prevent route leaks, implementing RPKI validation to detect and reject routes with invalid origin ASes, configuring GTSM and MD5 authentication on all BGP sessions, using Graceful Restart to minimize disruption during planned maintenance, and establishing baseline monitoring for all BGP sessions with alerting on state changes.

Why is monitoring BGP from the edge important?

Internal BGP routers provide a partial view of routing health, they show what your network is advertising and what your peers are sending you, but they can’t tell you how your prefixes appear to the rest of the internet. Distributed edge monitoring agents, placed at multiple locations globally, reveal route propagation delays, partial visibility issues, and route drops that only become apparent when viewed from outside your AS. This external perspective is essential for detecting BGP anomalies that affect user experience.

What is prefix filtering and why does it matter for BGP routing?

Prefix filtering (also called route filtering) is the practice of explicitly defining which prefixes are accepted from and advertised to each BGP peer. Without filtering, a misconfigured neighbor could leak your entire route table to the internet (a route leak), causing traffic disruption that extends far beyond your AS. Proper prefix filters restrict incoming routes to only those the neighbor should legitimately advertise, and outgoing routes to only those you intend to share.

How does RPKI improve BGP routing security?

RPKI (Resource Public Key Infrastructure) provides cryptographic validation of BGP route origins by allowing IP address holders to create Route Origin Authorizations (ROAs) that specify which AS is allowed to originate a given prefix. BGP routers with RPKI validation drop or deprioritize routes that fail validation (invalid origin AS or prefix length outside the authorized range). This prevents the most common class of BGP hijacking attacks and is increasingly required by major ISPs and IXPs.