{"id":11680,"date":"2021-09-24T12:15:00","date_gmt":"2021-09-24T15:15:00","guid":{"rendered":"https:\/\/made4it.com.br\/blackholejuniper\/"},"modified":"2023-03-08T14:58:12","modified_gmt":"2023-03-08T17:58:12","slug":"blackholejuniper","status":"publish","type":"post","link":"https:\/\/made4it.com.br\/en\/blackholejuniper\/","title":{"rendered":"Blackhole BGP \u2013 Juniper (Juniper MX5\/10\/40\/80\/104, MX204, MX240\/480\/960)"},"content":{"rendered":"\n<p>Now that you know it&#8217;s a blackhole (if you still know, check out our article on RTBH &#8211; Blackhole). Now it&#8217;s time to configure it and be able to protect yourself from DDoS attacks.<\/p>\n\n<p>To summarize the Blackhole, it is a technique of sending a route to the \u201cblack hole\u201d or simply making the router discard packets directed to that IP. With the blackhole you can also announce these attacked IPs to your suppliers\/upstreams and thus stop the attacks.<\/p>\n\n<p>Now that I know what, now comes the question how to blackhole my router? In today&#8217;s article we will show you how to configure Blackhole on Juniper Routers<br\/>To do the Blackhole manually we have some steps that are:<\/p>\n\n<ol class=\"wp-block-list\"><li>Identify the attacked IP<\/li><li>Create route to blackhole<\/li><li>Advertise this blackhole route via BGP to your carriers\/upstreams<\/li><\/ol>\n\n<p>You can automate all of this with Made4Flow, already closing a direct session and not having to do manual work.<br\/>If you want to know how to automate everything with Made4Flow, check out our next article.<\/p>\n\n<p>\n          <strong>Let&#8217;s go to the settings then<\/strong>\n        <\/p>\n\n<p>\n          <strong>1 \u2013 Identify the attacked IP<\/strong>\n        <\/p>\n\n<p>You can do this through Netflow analysis, as in Made4Flow, through the graphs and identify through the Raw Data Report, which IP has the most traffic and possibly being the victim of the attack.<br\/><br\/>Within Made4Flow, access for example the Interface Graph by Application and then, clicking on the most used port, you can identify which IP is being attacked<\/p>\n\n<p>Or through Made4Flow, simply by accessing the Anti-DDoS module -&gt; Active Anomalies<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1854\" height=\"753\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/1.png\" alt=\"\" class=\"wp-image-1873\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/1.png 1854w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/1-300x122.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/1-1024x416.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/1-768x312.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/1-1536x624.png 1536w\" sizes=\"(max-width: 1854px) 100vw, 1854px\" \/><\/a><\/figure>\n\n<p>The attacked IP was: 200.189.56.55 (Example)<\/p>\n\n<p>\n          <strong>2) Create a route to Discard (Blackhole)<\/strong>\n        <\/p>\n\n<p>After identifying the attacked IP via Made4Flow it is now time to create the route in your Juniper Router to effectively play the IP to Blackhole or Discard<\/p>\n\n<p>Let&#8217;s assume that the attacked IP is 200.200.200.1, let&#8217;s create the route as follows<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/2.png\"><img decoding=\"async\" width=\"1162\" height=\"110\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/2.png\" alt=\"\" class=\"wp-image-1874\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/2.png 1162w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/2-300x28.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/2-1024x97.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/2-768x73.png 768w\" sizes=\"(max-width: 1162px) 100vw, 1162px\" \/><\/a><\/figure>\n\n<p>Applied commands:<\/p>\n\n<p>configure<br\/>set routing-options static route 200.200.200.1\/32 discard<br\/>commit and-quit<\/p>\n\n<p>After applying the route pointing to Discard that IP will <strong>STOP WORKING!<\/strong><\/p>\n\n<p>You can check the route using the show command:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/3.png\"><img decoding=\"async\" width=\"1280\" height=\"332\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/3.png\" alt=\"\" class=\"wp-image-1875\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/3.png 1280w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/3-300x78.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/3-1024x266.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/3-768x199.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<p>If the route is showing as Discard, you are already sending it to Blackhole<\/p>\n\n<p>\n          <strong>3 &#8211; Announce the IP in blackhole via BGP to your operators\/upstreams<\/strong>\n        <\/p>\n\n<p>After identifying and blackhole the route you need to advertise via BGP to your operators\/upstreams.<\/p>\n\n<p>Before configuration, it is always recommended to talk to your Operator\/Upstream to find out which Blackhole BGP community is.<br\/><br\/>The BGP session with your carrier needs to be established.<\/p>\n\n<p>For this we have a few steps:<\/p>\n\n<ol class=\"wp-block-list\"><li>\n          <strong>Configure your Carrier\/Upstream Blackhole Community<\/strong>\n        <\/li><\/ol>\n\n<p>To configure the blackhole community so that it can be used later, we need to run the following command:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1344\" height=\"60\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/4.png\" alt=\"\" class=\"wp-image-1876\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/4.png 1344w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/4-300x13.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/4-1024x46.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/4-768x34.png 768w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/a><\/figure>\n\n<p>Command:<br\/>set policy-options community cm_blackhole_operadora_XPTO members 666:666<br\/>commit and-quit<\/p>\n\n<p>If it is necessary to add more communities, apply the same command changing the community name and number<\/p>\n\n<p><strong>Tip<\/strong>: Talk to your operator to find out which BGP blackhole community they use<\/p>\n\n<ol class=\"wp-block-list\" start=\"2\"><li>\n          <strong>Configure the policy-statement to Accept Blackole<\/strong>\n        <\/li><\/ol>\n\n<p>To configure the sending of Blackhole in the policy-statement, you must first identify the policy used in the BGP session with the Operator and then configure to accept the Blackhole Route within a term<\/p>\n\n<p>In our example, where the IP 200.200.200.1\/32 is attacked, we will use the following command:<br\/><br\/>Edit the policy:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1156\" height=\"122\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/5.png\" alt=\"\" class=\"wp-image-1877\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/5.png 1156w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/5-300x32.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/5-1024x108.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/5-768x81.png 768w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/><\/a><\/figure>\n\n<p>Create a new term already with the attacked IP:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1212\" height=\"72\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/6.png\" alt=\"\" class=\"wp-image-1878\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/6.png 1212w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/6-300x18.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/6-1024x61.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/6-768x46.png 768w\" sizes=\"(max-width: 1212px) 100vw, 1212px\" \/><\/a><\/figure>\n\n<p>Next step is to accept the route within this term<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"684\" height=\"64\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/7.png\" alt=\"\" class=\"wp-image-1879\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/7.png 684w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/7-300x28.png 300w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/a><\/figure>\n\n<p>Next step is to add the previously created community<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"40\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/8.png\" alt=\"\" class=\"wp-image-1880\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/8.png 1334w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/8-300x9.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/8-1024x31.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/8-768x23.png 768w\" sizes=\"(max-width: 1334px) 100vw, 1334px\" \/><\/a><\/figure>\n\n<p>Next step is to change the order of the policy, so that the term containing the blackhole route is at the top as possible, we will use the insert command<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"924\" height=\"54\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/9.png\" alt=\"\" class=\"wp-image-1881\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/9.png 924w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/9-300x18.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/9-768x45.png 768w\" sizes=\"(max-width: 924px) 100vw, 924px\" \/><\/a><\/figure>\n\n<p>We can validate with the show command that the configuration is correct:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1016\" height=\"728\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/10.png\" alt=\"\" class=\"wp-image-1882\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/10.png 1016w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/10-300x215.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/10-768x550.png 768w\" sizes=\"(max-width: 1016px) 100vw, 1016px\" \/><\/a><\/figure>\n\n<p>All commands used:<\/p>\n\n<p>configure exclusive<br\/>edit policy-options policy-statement OPERADORA-XPTO-OUT<br\/>set term IP-ATACADO from route-filter 200.200.200.1\/32 exact<br\/>set term IP-ATACADO then accept<br\/>set term IP-ATACADO then community set cm_blackhole_operadora_XPTO<br\/>insert term IP-ATACADO before term MEU-BLOCO<br\/>commit and-quit<\/p>\n\n<p>You can validate if you are advertising the route using the command show route advertising-protocol bgp 192.168.100.1<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1456\" height=\"292\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/11.png\" alt=\"\" class=\"wp-image-1883\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/11.png 1456w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/11-300x60.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/11-1024x205.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/11-768x154.png 768w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/><\/a><\/figure>\n\n<p>Once this is done, the IP will remain in blackhole and announced to your operator, the attack will cease if it goes to this single IP.<br\/><br\/>The complete configuration looked like this:<br\/><br\/>routing-options {<br\/> static {<br\/> route 200.200.200.0\/22 discard;<br\/> route 200.200.200.1\/32 discard;<br\/>  }<br\/> autonomous-system 65000;<br\/>}<br\/>protocols {<br\/> bgp {<br\/> group OPERADORA-XPTO {<br\/> export OPERADORA-XPTO-OUT;<br\/> neighbor 192.168.100.1 {<br\/> description OPERADORA-XPTO;<br\/> peer-as 64700;<br\/>  }<br\/>  }<br\/>  }<br\/>}<br\/>policy-options {<br\/> policy-statement OPERADORA-XPTO-OUT {<br\/> term IP-ATACADO {<br\/> from {<br\/> route-filter 200.200.200.1\/32 exact;<br\/>  }<br\/> then {<br\/> community set cm_blackhole_operadora_XPTO;<br\/> accept;<br\/>  }<br\/>  }<br\/> term MEU-BLOCO {<br\/> from {<br\/> route-filter 200.200.200.0\/22 exact;<br\/>  }<br\/> then accept;<br\/>  }<br\/> then reject;<br\/>  }<br\/> community cm_blackhole_operadora_XPTO members 666:666; }<\/p>\n\n<p>\n          <strong>Automating with Made4Flow<\/strong>\n        <\/p>\n\n<p>With Made4Flow it is possible to automate the blackhole announcement process of attacked IPs.<br\/><br\/>For that we need:<\/p>\n\n<ul class=\"wp-block-list\"><li>Configure BGP session between Edge Router and Made4Flow<\/li><\/ul>\n\n<p>To configure the BGP session between the Router and Made4Flow, you need to create a Policy and then the BGP session<\/p>\n\n<p>To configure policy, use the commands<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/12.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1106\" height=\"272\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/12.png\" alt=\"\" class=\"wp-image-1884\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/12.png 1106w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/12-300x74.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/12-1024x252.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/12-768x189.png 768w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/><\/a><\/figure>\n\n<p>Commands used:<br\/>edit policy-options policy-statement MADE4FLOW-IN<br\/>set then next-hop discard<br\/>set then accept<br\/>commit and-quit<\/p>\n\n<p>In this case we are also already added Next-hop manually in the router.<\/p>\n\n<p>Within Made4Flow, you can already advertise with the correct BGP and Next-hop community if you prefer.<\/p>\n\n<p>Configure the BGP session with Made4Flow, in our case we are going to use an iBGP, with the following configurations in the Juniper Router<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/13.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1132\" height=\"394\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/13.png\" alt=\"\" class=\"wp-image-1885\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/13.png 1132w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/13-300x104.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/13-1024x356.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/13-768x267.png 768w\" sizes=\"(max-width: 1132px) 100vw, 1132px\" \/><\/a><\/figure>\n\n<p>Commands used:<\/p>\n\n<p>Configure<br\/>set policy-options policy-statement EXPLICITY-DENY then reject<br\/>edit protocols bgp group MADE4FLOW<br\/>set type internal<br\/>set import MADE4FLOW-IN<br\/>set export EXPLICITY-DENY<br\/>set peer-as 65000<br\/>set neighbor 192.168.120.2 description &#8220;Made4Flow &#8211; Blackhole automatizado&#8221;<br\/>commit and-quit<\/p>\n\n<p><strong>Tip<\/strong>: remember to delete the blackhole routes manually, in our example: delete routing-options static route 200.200.200.1\/32<\/p>\n\n<ul class=\"wp-block-list\"><li>Configure Made4Flow to send via Actions<\/li><\/ul>\n\n<p>Within the Anti-DDoS Module, you can access the menu: Actions and Responses and configure the response to send the Blackhole with the correct BGP community:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/14.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1214\" height=\"590\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/14.png\" alt=\"\" class=\"wp-image-1886\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/14.png 1214w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/14-300x146.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/14-1024x498.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/14-768x373.png 768w\" sizes=\"(max-width: 1214px) 100vw, 1214px\" \/><\/a><\/figure>\n\n<p>\n          <br\/>\n          <strong>Configure the Router to Send to Carriers<\/strong>\n        <\/p>\n\n<p>To configure to send to the operators\/upstreams you need to configure a BGP community to be used in the term of the Policy with the Operator.<\/p>\n\n<p>For this we need to set up a community<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/15.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1368\" height=\"102\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/15.png\" alt=\"\" class=\"wp-image-1887\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/15.png 1368w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/15-300x22.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/15-1024x76.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/15-768x57.png 768w\" sizes=\"(max-width: 1368px) 100vw, 1368px\" \/><\/a><\/figure>\n\n<p>Comando: set policy-options community cm_blackhole_Made4Flow members 666:666<\/p>\n\n<p>The next step is to configure your operator\/upstream Policy, as in sending the blackhole, but now matching the community in the Term, as in our configuration:<br\/><\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/16.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1134\" height=\"714\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/16.png\" alt=\"\" class=\"wp-image-1888\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/16.png 1134w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/16-300x189.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/16-1024x645.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/16-768x484.png 768w\" sizes=\"(max-width: 1134px) 100vw, 1134px\" \/><\/a><\/figure>\n\n<p>-l<\/p>\n\n<p>Configure<br\/>edit policy-options policy-statement OPERADORA-XPTO-OUT<br\/>set term BLACKHOLE-MADE4FLOW from community cm_blackhole_Made4Flow<br\/>set term BLACKHOLE-MADE4FLOW then accept<br\/>set term BLACKHOLE-MADE4FLOW then community set cm_blackhole_operadora_XPTO<br\/>insert term BLACKHOLE-MADE4FLOW before term MEU-BLOCO<br\/>commit and-quit<\/p>\n\n<p>To check if you are sending the announcement to the operator use the commands:<\/p>\n\n<p>Check if you receive from Made4Flow<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/17.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1526\" height=\"316\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/17.png\" alt=\"\" class=\"wp-image-1889\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/17.png 1526w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/17-300x62.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/17-1024x212.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/17-768x159.png 768w\" sizes=\"(max-width: 1526px) 100vw, 1526px\" \/><\/a><\/figure>\n\n<p>Comando: show route receive-protocol bgp 192.168.120.2<\/p>\n\n<p>And if you are sending to the operator:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/18.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1460\" height=\"292\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/09\/18.png\" alt=\"\" class=\"wp-image-1890\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/18.png 1460w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/18-300x60.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/18-1024x205.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/09\/18-768x154.png 768w\" sizes=\"(max-width: 1460px) 100vw, 1460px\" \/><\/a><\/figure>\n\n<p>Comando: show route advertising-protocol bgp 192.168.100.1<\/p>\n\n<p>Having made these settings, <strong>the automation of Made4Flow is ready<\/strong>. Upon receiving an attack, Made4Flow can now send this route to Blackhole.<\/p>\n\n<p>To make it easier, we have the video below, showing in practice how to configure the Juniper Router with Blackhole.<\/p>\n\n          \n\n          <figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n            <div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Blackhole BGP em roteadores Juniper\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/rfjOnmnclgw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div>\n          <\/figure>\n          \n\n        \n\n<p>\n          <strong>\n            <em>If you have any questions, do not hesitate to contact us via WhatsApp, Social Media or E-mail.<\/em>\n          <\/strong>\n        <\/p>\n\n<p>\n          <strong>See you next time!<\/strong>\n        <\/p>\n","protected":false},"excerpt":{"rendered":"<p>To summarize the Blackhole, it is a technique of sending a route to the \u201cblack hole\u201d or simply making the router discard packets directed to that IP. In this article you will learn step by step how you can configure Blackhole on Juniper routers.<\/p>\n","protected":false},"author":13,"featured_media":8846,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[352],"tags":[440,441,444,442,443,445],"class_list":["post-11680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en","tag-blackhole-en","tag-blackhole-bgp-en","tag-blackhole-juniper-en","tag-ddos-protection","tag-juniper-automation","tag-juniper-routers"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts\/11680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/comments?post=11680"}],"version-history":[{"count":0,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts\/11680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/media\/8846"}],"wp:attachment":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/media?parent=11680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/categories?post=11680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/tags?post=11680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}