<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://bgp4all.com.au/pfs/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://bgp4all.com.au/pfs/feed.php">
        <title>Philip Smith&#039;s Internet Development Site - training:cnnic</title>
        <description></description>
        <link>https://bgp4all.com.au/pfs/</link>
        <image rdf:resource="https://bgp4all.com.au/pfs/_media/wiki/dokuwiki.svg" />
       <dc:date>2026-04-04T07:36:55+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/0-setup?rev=1477201023&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/1-routing?rev=1477201311&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/2-4byte?rev=1477201833&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/3-securing-router?rev=1477194460&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/4-traffic-filters?rev=1477202006&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/5-routing-security?rev=1477194813&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/6-netflow?rev=1477202230&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/address-plan?rev=1476874228&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/agenda?rev=1507794995&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/lab-access?rev=1477192839&amp;do=diff"/>
                <rdf:li rdf:resource="https://bgp4all.com.au/pfs/training/cnnic/start?rev=1507794911&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://bgp4all.com.au/pfs/_media/wiki/dokuwiki.svg">
        <title>Philip Smith's Internet Development Site</title>
        <link>https://bgp4all.com.au/pfs/</link>
        <url>https://bgp4all.com.au/pfs/_media/wiki/dokuwiki.svg</url>
    </image>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/0-setup?rev=1477201023&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T05:37:03+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0-setup</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/0-setup?rev=1477201023&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab

Objective

Using a dual stack topology, this lab investigates securing the router and the routing infrastructure for the network.

Lab Topology

The initial lab topology sets up 6 autonomous systems, each with four routers. In each AS, one router is the border router (for connecting to transit providers), one router is the core router (representing the rest of the network operator’s core network), one router is a peering router (for connecting to private peers and IXPs),…</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/1-routing?rev=1477201311&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T05:41:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>1-routing</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/1-routing?rev=1477201311&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab - Routing

Setting up OSPF

Dual stack OSPF in each AS

In each AS configure OSPF routing. As we are running a dual stack network, we need to run OSPFv2 for IPv4 routes and OSPFv3 for IPv6 routes. This means setting up the OSPF process, marking</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/2-4byte?rev=1477201833&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T05:50:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>2-4byte</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/2-4byte?rev=1477201833&amp;do=diff</link>
        <description>eBGP using 4-byte ASNs

Configuring the link to the Transit Provider

The next step is to set up eBGP with the Transit Provider. The lab instructors will be running the routers for the two Transit Providers and will have already configured them.

Physical Link</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/3-securing-router?rev=1477194460&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T03:47:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>3-securing-router</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/3-securing-router?rev=1477194460&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab - Securing the Router

Basic Best Practice

Getting used to IPv6 show commands in IOS

Try the following IPv6 show commands:
show ipv6 interface
show ipv6 neighbors
show ipv6 route
show ipv6 routers
show ipv6 ospf neighbors
show ipv6 ospf rib
show ipv6 traffic
show bgp ipv6 unicast summary
show ipv6 ?</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/4-traffic-filters?rev=1477202006&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T05:53:26+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>4-traffic-filters</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/4-traffic-filters?rev=1477202006&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab - Traffic Filters

Configuring Outbound IPv6 Traffic Filters

We now configure a traffic filter to only allow traffic from just your address block out of your network (this is BCP38 requirement). Note this configuration goes on the</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/5-routing-security?rev=1477194813&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T03:53:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>5-routing-security</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/5-routing-security?rev=1477194813&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab - Routing Protocol Security

OSPF neighbour authentication

Remove the packet filters from the previous examples

We need OSPFv3 and BGP to work for the remainder of the lab, so we will remove the packet filters we installed in the previous exercise. Simply go to the interfaces where you defined the “traffic-filter” commands and remove those. Also delete the “ipv6 access-list” configurations for these two traffic filters</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/6-netflow?rev=1477202230&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T05:57:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>6-netflow</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/6-netflow?rev=1477202230&amp;do=diff</link>
        <description>IPv6 Infrastructure Lab - Netflow

Exploring Netflow

Netflow identifies anomalous and security-related network activity by tracking network flows. NetFlow data can be viewed and analysed via the command line interface (CLI), or the data can be exported to a commercial or freeware NetFlow collector for aggregation and analysis. NetFlow collectors, through long-term trending, can provide network behaviour and usage analysis. NetFlow functions by performing analysis on specific attributes within I…</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/address-plan?rev=1476874228&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-19T10:50:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>address-plan</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/address-plan?rev=1476874228&amp;do=diff</link>
        <description>Address Space Allocation

This document describes the IP address plan we will use for this set of workshop exercises.

Wherever possible the plan tries to replicate real life as closely as possible.

The IPv4 address space used in these exercises is from subnets of 100.64.0.0/10 which is an [IPv4 Shared Address](</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/agenda?rev=1507794995&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-12T07:56:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>agenda</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/agenda?rev=1507794995&amp;do=diff</link>
        <description>Agenda

Time Schedule
 Session 1   09:00 - 10:30   Break       10:30 - 11:00   Session 2   11:00 - 12:30   Lunch       12:30 - 14:00   Session 3   14:00 - 15:30   Break       15:30 - 16:00   Session 4   16:00 - 17:30  
Instructors
 FL   First Name   Organisation</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/lab-access?rev=1477192839&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-10-23T03:20:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lab-access</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/lab-access?rev=1477192839&amp;do=diff</link>
        <description>Lab Access Instructions

Introduction

This lab runs on a virtualised environment for Cisco IOS called “Dynamips”. 

To join the network which the lab environment is on, associate your laptop with the wireless network called NSRC-PFS. The password for this network is</description>
    </item>
    <item rdf:about="https://bgp4all.com.au/pfs/training/cnnic/start?rev=1507794911&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-10-12T07:55:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>https://bgp4all.com.au/pfs/training/cnnic/start?rev=1507794911&amp;do=diff</link>
        <description>Internet and IPv6 Infrastructure Security Program

Workshop Goals

This three-day IPv6 &amp; BGP Workshop, teaching IPv6 and BGP operational skills

Target Audience

Technical staff involved in the Internet.

Workshop Items

	*   Agenda (includes links to presentations and schedule)</description>
    </item>
</rdf:RDF>
