IBGP or EBGP in an enterprise network?

I got the following question from one of my readers:

I recently started working at a very large enterprise and learnt that the network uses BGP internally. Running IBGP internally is not that unexpected, but after some further inquiry it seems that we are running EBGP internally. I must admit I'm a little surprised about the use of EBGP internally and I wanted to know your thoughts on it.

Although they are part of the same protocol, IBGP and EBGP solve two completely different problems; both of them can be used very successfully in a large enterprise network.

If all you want to do is to scale your network beyond the IGP limits, or make sure the access network flaps don’t affect the core, IBGP is the tool to use. As a downside, every IBGP router must be able to reach every BGP next hop in the same AS (you could change IBGP next hops with inbound route maps, but don’t do that outside of the CCIE lab). The BGP next hops are usually propagated through IGP (propagating them with BGP might even work, but wouldn’t be too far from the adventures of Baron Munchausen); the traffic flow between BGP next hops is thus completely controlled by IGP route selection rules.

EBGP is a completely different beast. Next hops are not propagated across multiple autonomous systems (yet again, there are exceptions, rarely useful beyond the perimeter of a CCIE lab); the router advertising the best EBGP path is generally the one forwarding the traffic into the adjacent AS. You can use this property of EBGP to implement complex routing policies in your network.

In a well-designed network, EBGP sessions usually follow physical layer 3 connectivity; IGBP sessions are usually established between routers that are further apart (commonly between edge routers and a set of centralized route reflectors). IBGP convergence is thus typically faster than EBGP convergence. Even more, IBGP does not need to be involved in the convergence process following a core link or node failure (IGP takes care of that), while you have to rely on EBGP to find alternate paths in EBGP-based networks.

You would run your whole enterprise network as a single AS (using only IBGP) if the only goal you wanted to reach is the increased stability of your core network. A mixture of IBGP and EBGP makes sense if you want to implement routing policies between regions (or countries/continents in a global network) and don’t care too much about the inter-regional convergence time. Using just EBGP with every BGP-speaking router in its own AS probably calls for a network redesign (MPLS/VPN networks where small single-router sites use EBGP to exchange routes with the PE-routers is an obvious exception).


  1. Another reason why EBGP may be seen inside an enterprise network would the use of a carrier provided MPLS L3VPN, as only EBGP is supported when BGP is used at the PE-CE interface. Support for IBGP is in the works, but currently still at draft stage: http://tools.ietf.org/html/draft-ietf-l3vpn-ibgp-08
  2. You might use ibgp with confederations, which would feel more the right way to do it, rather than doing ebgp with multiple AS.
  3. After a few months, it might not be as surprising as it is now for the reader. I'd much rather use eBGP to craft route policy than any IGP. IGP's are great for fast convergence and finding the shortest path, but there is a reason we don't use it on the Internet.

    There are many ways to route a large global network with multiple security domains and different teams of network engineers working independently. I can't imagine Google or Microsoft not using eBGP internally. It provides such a very nice clean delineation between different parts of the network. I have do direct knowledge of the MSFT network, so I'll use them as an example, I hope that their Bing and XBox Live and MSDN sites are managed somewhat independently, after all they are all likely pretty big networks with different security requirements and perhaps different protocol requirements. XBox, for example, might want to leverage multicast, whereas Bing might want to optimize for protocol simplicity. When different parts of the network have different business requirements, IMHO, it makes sense to isolate them with eBGP.

    Confederations are great whenever one group of engineers wants to divide up their own network into more manageable chunks, but with my example above, do confederations still seem to be the most logical solution? I think ASN scale more with the number of network engineers than routers. Just a SWAG.

  4. Hi,

    Can you update your website so we can share these articles on Twitter or even facebook?
  5. How about clicking the "facebook" or "twitter" button just above my bio?
  6. It's also important to consider whether IBGP or EBGP will integrate with other services (like MPLS/VPLS). Some companies I know use EIGRP in combination with VPLS. They are currently considering moving to EBGP though.

    Great article - keep up the good work Ivan!

  7. Ivan,

    Great post. In fact it was absolutely fabulous.

    Would love to see a diagram of what you're talking about to be sure I fully understand (I dont ...quite , right now).
  8. Ivan,
    can you please clarify your stament "If you want to scale your network or make sure the access network flaps don’t affect the core, IBGP is the tool to use." ? Is eBGP not as scalable or stable?
    Besides limited number of private ASNs needed for a large enterprise network are there any other disadvantages of using eBGP?
    Thanks George
  9. I probably should have said "If you _only_ want to scale your network ... use IBGP". Reworded. Does it make more sense now?

    EBGP is absolutely stable and scalable (even more so than IBGP), but is slower to converge.
  10. I believe that using modifier "absolutely" is not entirely accurate :) eBGP is /relatively/ scalable, but alas still the only deployed inter-AS routing protocol. Stability at large-scale deployments could be questioned, especially if it's not explicitly defined - e.g. Internet routing tables are never entirely stable and hence global routing using BGP never converges. Scalability is also tricky, and this problem has been intensely discussed for the last 6-7 years at least. While I'm 100% sure you are perfectly familiar with both of these facts, I still wanted to point out that BGP has some well-known drawback and could not serve as a "bulletproof" solution. There are many common issues associated with BGP deployments that are not very well documented, for some reason :)
  11. Peter, it is interested that you selected MSFT network as your example :) I'm not sure if I can talk about it openly, but the design follows many "well-known" templates with some quirks, providing some level of isolation, as you mentioned. Management is another tricky issue, and I believe it is the major scaling factor for large network - probably even more important than platform and protocol limitations. It is interesting that on the networks of that scale, implementation and operations play much more significant role than architectures, in my opinion. After all, designing an architecture for a large network is not that hard. Implementing, operating and maintaing it in good posture is much more challenging problem :)
  12. Would you be happy with "EBGP is like democracy" - not perfect, but still the best option available? :-E
  13. Hi all, I would like to take this opportunity to seek some info on a scenario I discovered recently.

    I have discovered that an IBGP route is not being removed from the IP RIB and BGP table when the IBGP neighbor address (which is also the BGP Next Hop) is within the range of an IBGP-learnt supernet route.
    This is discovered when a PBR with the "verify-reachability" option is not working as intended upon link failures to the next-hop IBGP neighbor. Indeed, the "recurvise" option for PBR is the best option, but apparently it is a C3750 switch running 12.2SE and the "recurvise" option is not available. :)

    This is documented as Scenario #3 in the following blog post.

    Appreciate someone can share some info on whether this behavior is described somewhere in the BGP RFCs, and whether this is Cisco-specific. Thanks. :-)
  14. It's a FAD (functions-as-designed) 8-)

    If the BGP next hop is reachable (even though it's reachable through a BGP route), the BGP route is considered valid. You might want to check the fast fallover and BGP next hop checking features available in Cisco IOS.

  15. Thanks Ivan for the fast response! Will look into the links later... :)
  16. Hi all,

    I was wondering if it was possible to use IBGP over an MPLS VPN network to interconnect routers on different sites, in many different countries. I am working on an enterprise network which is migrating with two different SPs for the MPLS VPN (not all sites will be eligible to the two SPs) and I don't want to rely on an IGP for this kind of infrastructure. I was thinking about using IBGP between my enterprise routers over the two MPLS VPNs, do you think it is possible ? a good idea ? I'm not sure that EBGP would be a good decision because on every site I would have to manage the two SPs on every site multihomed with a common AS number on each site.

    Your point of view ?

  17. I wouldn't try to make it work with IBGP, unless both service providers offer Carrier's carrier service. Once I've been involved in a similar design using IBGP and it was "somewhat" nasty.

    You should also consider using the ISPs as pure IP transport and run LISP or DMVPN over their IP infrastructures.

    BTW, if you'd like to discuss your design with me, this might not be a bad option: http://www.ioshints.info/ExpertExpress
  18. Makes sense though we don't have all the details. I assume that this is cBGP or confederated BGP as we used to call it in the old days. Question though, point to point interface and router loopbacks (or equiv) require an IGP like OSPF or ISIS since BGP requires an IGP to for finding next-hop information or routes are inaccessible. Statics are possible, but sloppy.

    The following configuration is what 95% of all ISPs run and clearly the Chief Network Architect of this global network comes from an ISP.
  19. If the VPN is purchased from a major carrier like BT, AT&T or Verizon (RFC2547bis MPLS), then yes, BGP or MP-BGP is always used on the carriers network to supply the service. The IGP that you use is your choice, however, an EGP like BGP is not recommended since it's "heavy" and unnecessary. OSPF/EIGRP are the better choices.
  20. Depends on what they're doing. If they redistribute BGP into IGP on the PE-router then using IGP might make sense; if they have their own CE-routers and redistribute BGP-into-IGP on the CE-router, all the MPLS/VPN communities are lost and you get external OSPF/EIGRP routes. In that case, EBGP is a way better option. See also:

  21. Hi Ivan, great article. I work with a lot of large Data Center's, and these massively scalable DCs (MSDC) are all using BGP for the routing. A question came up recently regarding the use of IBGP or EBGP. Typically the DC is laid out in a spine leaf architecture, where a row of large routers make up the spine, and the leaf is a top-of-rack (ToR) switch/router. I tested both IBGP and EBGP in this setup, and found the performance and convergence times to be the same. Both use ECMP to utilize all available links.
    -IBGP requires the spine router to all be route-reflectors, and a route-map is used on the leaf peering to set the nexthop to the peering address. This essentially makes IBGP function like EBGP.
    -To deploy EBGP, the spine is all one AS, and each leaf is a different AS. So every leaf router is its own AS. I found this to consume a lot of private AS space, and operationally be a lot more complicated.
    Do you see any other advantages or disadvantages with either design? I think this is a really cool use of BGP in the MSDC's, and wanted to share this since it shows how IBGP can be used without an IGP. :)
    1. One of them is easier to understand (EBGP with no additional magic tricks), the other one is easier to provision (because you use the same configuration template everywhere and don't have to keep track of AS numbers).
  22. Hi Ivan,

    This question has always puzzled me. From an enterprise customer preservative, should I run iBGP or iBGP+ IGRP (OSPF/ISIS/EIGRP) or IGP while doing mutual redistribution on the edge routers. I was hoping if you could share some thoughtful insight on when to select one over the another?

    Thanks, Khalid

    1. See https: //blog.ipspace.net/2022/03/bgp-igp-enterprise-network.html
Add comment