Skip to content

Bogon Prefixes

"Bogon" prefixes are non-routeable or reserved prefixes which should never be seen in the global routing table.

IPv4

When IPv4 was created, the inventors reserved certain part of the address space for specific purposes. These were the times of class-A,B,C networks (if anybody still mentions them - the concept was abolished in 1993 in some RFCs starting with RFC1517).

The following IPv4 space is still considered to be not routable and should never be announced via BGP:

  • Private IPv4 space as defined in RFC1918. Networks 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16 are reserved for private use and should never be announced.
  • IPv4 networks reserved for documentation purposes defined in RFC5737. These three networks are reserved and should not be routed (but you might see them in this document as example networks).
  • Reserved for multicast: The address block 224.0.0.0/4 was reserved for multicast and cannot be used for anything else. Do not accept announcements out of it via BGP.
  • So-called Class-E: The network block 240.0.0.0/4 was always reserved "for future use" which never came. Today this range is considered to be not usable and therefore should not be accepted via BGP.
  • More can be found at this IANA website. Everything with "Globally Reachable False" should be filtered out.

IPv6

In IPv6, there is a similar list at IANA. However, for IPv6 it is easier to positive-filter for 2000::/3, as this is the only block where currently unicast address assignments were made from. Currently. You might check frequently if other blocks have been added. It is strongly recommended that you automate this task.

Configuration Examples

For IPv4, you can simply add all unwanted prefixes to the list we defined in the previous section:

ip prefix-list ipv4-unwanted permit 192.168.0.0/16 le 32
ip prefix-list ipv4-unwanted permit 172.16.0.0/12 le 32
ip prefix-list ipv4-unwanted permit 10.0.0.0/8 le 32
...

For IPv4, you can simply add all unwanted prefixes to the list:

prefix-set bogon-ipv4
  # RFC 1122 'this' Network
  0.0.0.0/8 le 32,
  # RFC 1918 Private
  10.0.0.0/8 le 32,
  # RFC 6598 Carrier grade nat space
  100.64.0.0/10 le 32,
  # RFC 1122 Loopback
  127.0.0.0/8 le 32,
  # RFC 3927 Link Local
  169.254.0.0/16 le 32,
  # RFC 1918 Private
  172.16.0.0/12 le 32,
  # RFC 6890 Protocol Assignments
  192.0.0.0/24 le 32,
  # RFC 5737 Documentation TEST-NET-1
  192.0.2.0/24 le 32,
  # RFC 7526 6to4 anycast relay
  192.88.99.0/24 le 32,
  # RFC 1918 Private
  192.168.0.0/16 le 32,
  # RFC 2544 Benchmarking
  198.18.0.0/15 le 32,
  # RFC 5737 Documentation TEST-NET-2
  198.51.100.0/24 le 32,
  # RFC 5737 Documentation TEST-NET-3
  203.0.113.0/24 le 32,
  # RFC 5771 Multicast
  224.0.0.0/4 le 32,
  # RFC 1112 Reserved
  240.0.0.0/4 le 32
end-set

prefix-set bogon-ipv6
  #IETF reserved
  ::/8 le 128,
  # RFC6666 Discard-Only Address Block
  100::/64 le 128,
  # RFC4380,RFC8190 TEREDO
  2001::/32 le 128,
  # RFC5180 Benchmarking
  2001:2::/48 le 128,
  # RFC7450 Documentation
  2001:db8::/32 le 128,
  # RFC3056 6to4
  2002::/16 le 128,
  # RFC9637 Documentation Space
  3fff::/20 le 128,
  # RFC4193,RFC8190 Unique-Local
  fc00::/7 le 128,
  # RFC4291 Link-Local Unicast
  fe80::/10 le 128
end-set

route-policy reject-bogons-ipv4-networks
  if destination in bogon-ipv4 then
    drop
  endif
end-policy
route-policy reject-bogons-ipv6-networks
  if destination in bogon-ipv6 then
    drop
  endif
end-policy
...

You can add this to your existing filter or you can create a sub-filter for better readability:

/routing filter
add action=reject chain=ipv4-unwanted prefix=192.168.0.0/16 prefix-length=16-32
add action=reject chain=ipv4-unwanted prefix=172.16.0.0/12 prefix-length=12-32
add action=reject chain=ipv4-unwanted prefix=10.0.0.0/8 prefix-length=8-32
...

define BOGON_PREFIXES4 = [
  0.0.0.0/8+,         # RFC 1122 'this' Network
  10.0.0.0/8+,        # RFC 1918 Private
  100.64.0.0/10+,     # RFC 6598 Carrier grade nat space
  127.0.0.0/8+,       # RFC 1122 Loopback
  169.254.0.0/16+,    # RFC 3927 Link Local
  172.16.0.0/12+,     # RFC 1918 Private
  192.0.2.0/24+,      # RFC 5737 Documentation TEST-NET-1
  192.168.0.0/16+,    # RFC 1918 Private
  198.18.0.0/15+,     # RFC 2544 Benchmarking
  198.51.100.0/24+,   # RFC 5737 Documentation TEST-NET-2
  203.0.113.0/24+,    # RFC 5737 Documentation TEST-NET-3
  224.0.0.0/4+,       # RFC 5771 Multicast
  240.0.0.0/4+        # RFC 1112 Reserved
];
define BOGON_PREFIXES6 = [
    ::/8+,           # RFC4291 Loopback and more
    0100::/64+,      # RFC6666 Discard-Only Address Block
    2001:2::/48+,    # RFC5180 Benchmarking
    2001:10::/28+    # RFC4843 ORCHID
    2001:db8::/32+,  # RFC7450 Documentation
    3ffe::/16+,      # RFC3701 old 6bone
    3fff::/20+,      # RFC9637 Documentation
    5f00::/16+,      # RFC9602 SRv6 SIDs
    fc00::/7+,       # RFC4193,RFC8190 Unique-Local
    fe80::/10+       # RFC4291 Link-Local Unicast
    fec0::/10+       # RFC3879 old Site-Local Unicast
    ff00::/8+        # RFC4291 Multicast
];
function reject_bogon_prefixes4()
prefix set bogon_prefixes4;
{
  bogon_prefixes4 = BOGON_PREFIXES4;
  if (net ~ bogon_prefixes4) then {
    # optional logging:
    # print "Reject: Bogon prefix: ", net, " ", bgp_path;
    reject;
  }
}
function reject_bogon_prefixes6()
prefix set bogon_prefixes6;
{
  bogon_prefixes6 = BOGON_PREFIXES6;
  if (net ~ bogon_prefixes6) then {
    # optional logging:
    # print "Reject: Bogon prefix: ", net, " ", bgp_path;
    reject;
  }
}
filter import_ipv4 {
  reject_bogon_prefixes4();
  ...
  accept;
}
filter import_ipv6 {
  reject_bogon_prefixes6();
  ...
  accept;
}