[Note that this file is a concatenation of more than one RFC.] Network Working Group J. Hawkinson Request for Comments: 1930 BBN Planet BCP: 6 T. Bates Category: Best Current Practice MCI March 1996 Guidelines for creation, selection, and registration of an Autonomous System (AS) Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited. Abstract This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. ASes are the unit of routing policy in the modern world of exterior routing, and are specifically applicable to protocols like EGP (Exterior Gateway Protocol, now at historical status; see [EGP]), BGP (Border Gateway Protocol, the current de facto standard for inter-AS routing; see [BGP-4]), and IDRP (The OSI Inter-Domain Routing Protocol, which the Internet is expected to adopt when BGP becomes obsolete; see [IDRP]). It should be noted that the IDRP equivalent of an AS is the RDI, or Routing Domain Identifier. Table of Contents 1. Introduction ............................................ 2 2. Motivation .............................................. 2 3. Definitions ............................................. 2 4. Common errors in allocating ASes ........................ 5 5. Criteria for the decision -- do I need an AS? .......... 5 5.1 Sample Cases ........................................... 6 5.2 Other Factors .......................................... 7 6. Speculation ............................................. 7 7. One prefix, one origin AS ............................... 8 8. IGP issues .............................................. 8 9. AS Space exhaustion ..................................... 8 10. Reserved AS Numbers .................................... 9 11. Security Considerations ................................ 9 12. Acknowledgments ........................................ 9 13. References ............................................. 9 14. Authors' Addresses ..................................... 10 Hawkinson & Bates Best Current Practice [Page 1] RFC 1930 Guidelines for creation of an AS March 1996 1. Introduction This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. ASes are the unit of routing policy in the modern world of exterior routing, and are specifically applicable to protocols like EGP (Exterior Gateway Protocol, now at historical status; see [EGP]), BGP (Border Gateway Protocol, the current de facto standard for inter-AS routing; see [BGP-4]), and IDRP (The OSI Inter-Domain Routing Protocol, which the Internet is expected to adopt when BGP becomes obsolete; see [IDRP]). It should be noted that the IDRP equivalent of an AS is the RDI, or Routing Domain Identifier. 2. Motivation This memo is aimed at network operators and service providers who need to understand under what circumstances they should make use of an AS. It is expected that the reader is familiar with routing protocols and will be someone who configures and operates Internet networks. Unfortunately, there is a great deal of confusion in how ASes should be used today; this memo attempts to clear up some of this confusion, as well as acting as a simple guide to today's exterior routing. 3. Definitions This document refers to the term "prefix" throughout. In the current classless Internet (see [CIDR]), a block of class A, B, or C networks may be referred to by merely a prefix and a mask, so long as such a block of networks begins and ends on a power-of-two boundary. For example, the networks: 192.168.0.0/24 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 can be simply referred to as: 192.168.0.0/22 The term "prefix" as it is used here is equivalent to "CIDR block", and in simple terms may be thought of as a group of one or more networks. We use the term "network" to mean classful network, or "A, B, C network". The definition of AS has been unclear and ambiguous for some time. [BGP-4] states: Hawkinson & Bates Best Current Practice [Page 2] RFC 1930 Guidelines for creation of an AS March 1996 The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS, and using an exterior gateway protocol to route packets to other ASes. Since this classic definition was developed, it has become common for a single AS to use several interior gateway protocols and sometimes several sets of metrics within an AS. The use of the term Autonomous System here stresses the fact that, even when multiple IGPs and metrics are used, the administration of an AS appears to other ASes to have a single coherent interior routing plan and presents a consistent picture of what networks are reachable through it. To rephrase succinctly: An AS is a connected group of one or more IP prefixes run by one or more network operators which has a SINGLE and CLEARLY DEFINED routing policy. Routing policy here is defined as how routing decisions are made in the Internet today. It is the exchange of routing information between ASes that is subject to routing policies. Consider the case of two ASes, X and Y exchanging routing information: NET1 ...... ASX <---> ASY ....... NET2 ASX knows how to reach a prefix called NET1. It does not matter whether NET1 belongs to ASX or to some other AS which exchanges routing information with ASX, either directly or indirectly; we just assume that ASX knows how to direct packets towards NET1. Likewise ASY knows how to reach NET2. In order for traffic from NET2 to NET1 to flow between ASX and ASY, ASX has to announce NET1 to ASY using an exterior routing protocol; this means that ASX is willing to accept traffic directed to NET1 from ASY. Policy comes into play when ASX decides to announce NET1 to ASY. For traffic to flow, ASY has to accept this routing information and use it. It is ASY's privilege to either use or disregard the information that it receives from ASX about NET1's reachability. ASY might decide not to use this information if it does not want to send traffic to NET1 at all or if it considers another route more appropriate to reach NET1. In order for traffic in the direction of NET1 to flow between ASX and ASY, ASX must announce that route to ASY and ASY must accept it from ASX: Hawkinson & Bates Best Current Practice [Page 3] RFC 1930 Guidelines for creation of an AS March 1996 resulting packet flow towards NET1 <<=================================== | | announce NET1 | accept NET1 --------------> + -------------> | AS X | AS Y | <------------- + <-------------- accept NET2 | announce NET2 | | resulting packet flow towards NET2 ===================================>> Ideally, though seldom practically, the announcement and acceptance policies of ASX and ASY are symmetrical. In order for traffic towards NET2 to flow, announcement and acceptance of NET2 must be in place (mirror image of NET1). For almost all applications connectivity in just one direction is not useful at all. It should be noted that, in more complex topologies than this example, traffic from NET1 to NET2 may not necessarily take the same path as traffic from NET2 to NET1; this is called asymmetrical routing. Asymmetrical routing is not inherently bad, but can often cause performance problems for higher level protocols, such as TCP, and should be used with caution and only when necessary. However, assymetric routing may be a requirement for mobile hosts and inherently asymmetric siutation, such a satelite download and a modem upload connection. Policies are not configured for each prefix separately but for groups of prefixes. These groups of prefixes are ASes. An AS has a globally unique number (sometimes referred to as an ASN, or Autonomous System Number) associated with it; this number is used in both the exchange of exterior routing information (between neighboring ASes), and as an identifier of the AS itself. In routing terms, an AS will normally use one or more interior gateway protocols (IGPs) when exchanging reachability information within its own AS. See "IGP Issues". Hawkinson & Bates Best Current Practice [Page 4] RFC 1930 Guidelines for creation of an AS March 1996 4. Common errors in allocating ASes The term AS is often confused or even misused as a convenient way of grouping together a set of prefixes which belong under the same administrative umbrella, even if within that group of prefixes there are various different routing policies. Without exception, an AS must have only one routing policy. It is essential that careful consideration and coordination be applied during the creation of an AS. Using an AS merely for the sake of having an AS is to be avoided, as is the worst-case scenario of one AS per classful network (the IDEAL situation is to have one prefix, containing many longer prefixes, per AS). This may mean that some re-engineering may be required in order to apply the criteria and guidelines for creation and allocation of an AS that we list below; nevertheless, doing so is probably the only way to implement the desired routing policy. If you are currently engineering an AS, careful thought should be taken to register appropriately sized CIDR blocks with your registration authority in order to minimize the number of advertised prefixes from your AS. In the perfect world that number can, and should, be as low as one. Some router implementations use an AS number as a form of tagging to identify interior as well as exterior routing processes. This tag does not need to be unique unless routing information is indeed exchanged with other ASes. See "IGP Issues". 5. Criteria for the decision -- do I need an AS? * Exchange of external routing information An AS must be used for exchanging external routing information with other ASes through an exterior routing protocol. The cur- rent recommended exterior routing protocol is BGP, the Border Gateway Protocol. However, the exchange of external routing information alone does not constitute the need for an AS. See "Sample Cases" below. * Many prefixes, one AS As a general rule, one should try to place as many prefixes as possible within a given AS, provided all of them conform to the same routing policy. Hawkinson & Bates Best Current Practice [Page 5] RFC 1930 Guidelines for creation of an AS March 1996 * Unique routing policy An AS is only needed when you have a routing policy which is different from that of your border gateway peers. Here routing policy refers to how the rest of the Internet makes routing decisions based on information from your AS. See "Sample Cases" below to see exactly when this criteria will apply. 5.1 Sample Cases * Single-homed site, single prefix A separate AS is not needed; the prefix should be placed in an AS of the provider. The site's prefix has exactly the same rout- ing policy as the other customers of the site's service provider, and there is no need to make any distinction in rout- ing information. This idea may at first seem slightly alien to some, but it high- lights the clear distinction in the use of the AS number as a representation of routing policy as opposed to some form of administrative use. In some situations, a single site, or piece of a site, may find it necessary to have a policy different from that of its provider, or the rest of the site. In such an instance, a sepa- rate AS must be created for the affected prefixes. This situa- tion is rare and should almost never happen. Very few stub sites require different routing policies than their parents. Because the AS is the unit of policy, however, this sometimes occurs. * Single-homed site, multiple prefixes Again, a separate AS is not needed; the prefixes should be placed in an AS of the site's provider. * Multi-homed site Here multi-homed is taken to mean a prefix or group of prefixes which connects to more than one service provider (i.e. more than one AS with its own routing policy). It does not mean a network multi-homed running an IGP for the purposes of resilience. An AS is required; the site's prefixes should be part of a single AS, distinct from the ASes of its service providers. This allows the customer the ability to have a different repre- sentation of policy and preference among the different service providers. Hawkinson & Bates Best Current Practice [Page 6] RFC 1930 Guidelines for creation of an AS March 1996 This is ALMOST THE ONLY case where a network operator should create its own AS number. In this case, the site should ensure that it has the necessary facilities to run appropriate routing protocols, such as BGP4. 5.2 Other factors * Topology Routing policy decisions such as geography, AUP (Acceptable Use Policy) compliance and network topology can influence decisions of AS creation. However, all too often these are done without consideration of whether or not an AS is needed in terms of adding additional information for routing policy decisions by the rest of the Internet. Careful consideration should be taken when basing AS creation on these type of criteria. * Transition / "future-proofing" Often a site will be connected to a single service provider but has plans to connect to another at some point in the future. This is not enough of a reason to create an AS before you really need it. The AS number space is finite and the limited amount of re-engineering needed when you connect to another service provider should be considered as a natural step in transition. * History AS number application forms have historically made no reference to routing policy. All too often ASes have been created purely because it was seen as "part of the process" of connecting to the Internet. The document should be used as a reference from future application forms to show clearly when an AS is needed. 6. Speculation 1) If provider A and provider B have a large presence in a geographical area (or other routing domain), and many customers are multi-homed between them, it makes sense for all of those customers to be placed within the same AS. However, it is noted that case should only be looked at if practical to do so and fully coordinated between customers and service providers involved. 2) Sites should not be forced to place themselves in a separate AS just so that someone else (externally) can make AS-based policy decisions. Nevertheless, it may occasionally be necessary to split up an AS or a prefix into two ASes for policy reasons. Those making Hawkinson & Bates Best Current Practice [Page 7] RFC 1930 Guidelines for creation of an AS March 1996 external policy may request the network operators make such AS changes, but the final decision is up to those network operators who manage the prefixes in question, as well as the ASes containing them. This is, of course, a trade off -- it will not always be possible to implement all desired routing policies. 7. One prefix, one origin AS Generally, a prefix can should belong to only one AS. This is a direct consequence of the fact that at each point in the Internet there can be exactly one routing policy for traffic destined to each prefix. In the case of an prefix which is used in neighbor peering between two ASes, a conscious decision should be made as to which AS this prefix actually resides in. With the introduction of aggregation it should be noted that a prefix may be represented as residing in more than one AS, however, this is very much the exception rather than the rule. This happens when aggregating using the AS_SET attribute in BGP, wherein the concept of origin is lost. In some cases the origin AS is lost altogether if there is a less specific aggregate announcement setting the ATOMIC_AGGREGATE attribute. 8. IGP Issues As stated above, many router vendors require an identifier for tagging their IGP processes. However, this tag does not need to be globally unique. In practice this information is never seen by exterior routing protocols. If already running an exterior routing protocol, it is perfectly reasonable to use your AS number as an IGP tag; if you do not, choosing from the private use range is also acceptable (see "Reserved AS Numbers"). Merely running an IGP is not grounds for registration of an AS number. With the advent of BGP4 it becomes necessary to use an IGP that can carry classless routes. Examples include OSPF [OSPF] and ISIS [ISIS]. 9. AS Space exhaustion The AS number space is a finite amount of address space. It is currently defined as a 16 bit integer and hence limited to 65535 unique AS numbers. At the time of writing some 5,100 ASes have been allocated and a little under 600 ASes are actively routed in the global Internet. It is clear that this growth needs to be continually monitored. However, if the criteria applied above are adhered to, then there is no immediate danger of AS space exhaustion. It is expected that IDRP will be deployed before this becomes an issue. IDRP does not have a fixed limit on the size of an RDI. Hawkinson & Bates Best Current Practice [Page 8] RFC 1930 Guidelines for creation of an AS March 1996 10. Reserved AS Numbers The Internet Assigned Numbers Authority (IANA) has reserved the following block of AS numbers for private use (not to be advertised on the global Internet): 64512 through 65535 11. Security Considerations There are few security concerns regarding the selection of ASes. AS number to owner mappings are public knowledge (in WHOIS), and attempting to change that would serve only to confuse those people attempting to route IP traffic on the Internet. 12. Acknowledgments This document is largely based on [RIPE-109], and is intended to have a wider scope than purely the RIPE community; this document would not exist without [RIPE-109]. 13. References [RIPE-109] Bates, T., Lord, A., "Autonomous System Number Application Form & Supporting Notes", RIPE 109, RIPE NCC, 1 March 1994. URL: ftp://ftp.ripe.net/ripe/docs/ripe-109.txt. [BGP-4] Rekhter, Y. and T. Li, "A Border Gateway Protocol 4 (BGP-4)", RFC 1654, T.J. Watson Research Center, cisco Systems, July 1994. [EGP] Mills, D., "Exterior Gateway Protocol Formal Specifications", STD 18, RFC 904, International Telegraph and Telephone Co., April 1984. [IDRP] Kunzinger, C., Editor, "OSI Inter-Domain Routing Protocol (IDRP)", ISO/IEC 10747, Work In Progress, October 1993. [CIDR] Fuller, V., T. Li, J. Yu, and K. Varadhan, "Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy", RFC 1519, BARRnet, cisco, MERIT, OARnet, September 1993. Hawkinson & Bates Best Current Practice [Page 9] RFC 1930 Guidelines for creation of an AS March 1996 [OSPF] Moy, J., "OSPF Version 2", RFC 1583, March 1994. [ISIS] Callon, R., "Use of OSI IS-IS for Routing in TCP/IP and Multi- Protocol Environments", RFC 1195, Digital Equipment Corporation, December 1990. 14. Authors' Addresses John Hawkinson BBN Planet Corporation 150 CambridgePark Drive Cambridge, MA 02139 Phone: +1 617 873 3180 EMail: jhawk@bbnplanet.com Tony Bates MCI 2100 Reston Parkway Reston, VA 22094 Phone: +1 703 715 7521 EMail: Tony.Bates@mci.net Hawkinson & Bates Best Current Practice [Page 10] ========================================================================= Internet Engineering Task Force (IETF) J. Mitchell Request for Comments: 6996 Microsoft Corporation BCP: 6 July 2013 Updates: 1930 Category: Best Current Practice ISSN: 2070-1721 Autonomous System (AS) Reservation for Private Use Abstract This document describes the reservation of Autonomous System Numbers (ASNs) that are for Private Use only, known as Private Use ASNs, and provides operational guidance on their use. This document enlarges the total space available for Private Use ASNs by documenting the reservation of a second, larger range and updates RFC 1930 by replacing Section 10 of that document. Status of This Memo This memo documents an Internet Best Current Practice. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on BCPs is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6996. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Mitchell Best Current Practice [Page 1] RFC 6996 Private Use AS Reservation July 2013 1. Introduction The original IANA reservation of Autonomous System Numbers (ASNs) for Private Use was a block of 1023 ASNs. This was also documented by the IETF in Section 10 of [RFC1930]. Since the time that the range was reserved, the Border Gateway Protocol (BGP) [RFC4271] has seen deployment in new application domains, such as data center networks, which require a larger Private Use AS space. Since the introduction of "BGP Support for Four-Octet Autonomous System (AS) Number Space" [RFC6793], the total size of ASN space has increased dramatically. A larger subset of the space is available to network operators to deploy in these Private Use cases. The existing range of Private Use ASNs is widely deployed, and the ability to renumber this resource in existing networks cannot be coordinated given that these ASNs, by definition, are not registered. Therefore, this RFC documents the existing Private Use ASN reservation while also introducing a second, larger range that can also be utilized. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 3. Private Use ASNs To allow the continued growth of BGP protocol usage in new network applications that utilize Private Use ASNs, two ranges of ASNs are reserved by Section 5 of this document. The first is part of the original 16-bit Autonomous System range previously defined in [RFC1930], and the second is a larger range out of the Four-Octet AS Number Space [RFC6793]. 4. Operational Considerations If Private Use ASNs are used and prefixes originate from these ASNs, Private Use ASNs MUST be removed from AS path attributes (including AS4_PATH if utilizing a four-octet AS number space) before being advertised to the global Internet. Operators SHOULD ensure that all External Border Gateway Protocol (EBGP) speakers support the extensions described in [RFC6793] and that implementation-specific features that recognize Private Use ASNs have been updated to recognize both ranges prior to making use of the newer, numerically higher range of Private Use ASNs in the four-octet AS number space. Some existing implementations that remove Private Use ASNs from the AS_PATH are known to not remove Private Use ASNs if the AS_PATH contains a mixture of Private Use and Non-Private Use ASNs. If such Mitchell Best Current Practice [Page 2] RFC 6996 Private Use AS Reservation July 2013 implementations have not been updated to recognize the new range of ASNs in this document and a mix of old and new range Private Use ASNs exist in the AS4_PATH, these implementations will likely cease to remove any Private Use ASNs from either of the AS path attributes. Normal AS path filtering MAY also be used to prevent prefixes originating from Private Use ASNs from being advertised to the global Internet. 5. IANA Considerations IANA has reserved, for Private Use, a contiguous block of 1023 Autonomous System numbers from the "16-bit Autonomous System Numbers" registry, namely 64512 - 65534 inclusive. IANA has also reserved, for Private Use, a contiguous block of 94,967,295 Autonomous System numbers from the "32-bit Autonomous System Numbers" registry, namely 4200000000 - 4294967294 inclusive. These reservations have been documented in the IANA "Autonomous System (AS) Numbers" registry [IANA.AS]. 6. Security Considerations Private Use ASNs do not raise any unique security concerns. Loss of connectivity might result from their inappropriate use, specifically outside of a single organization, since they are not globally unique. This loss of connectivity is limited to the organization using Private Use ASNs inappropriately or without reference to Section 4. General BGP security considerations are discussed in [RFC4271] and [RFC4272]. Identification of the originator of a route with a Private Use ASN in the AS path would have to be done by tracking the route back to the neighboring globally unique AS in the path or by inspecting other attributes. 7. References 7.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, January 2006. [RFC6793] Vohra, Q. and E. Chen, "BGP Support for Four-Octet Autonomous System (AS) Number Space", RFC 6793, December 2012. Mitchell Best Current Practice [Page 3] RFC 6996 Private Use AS Reservation July 2013 7.2. Informative References [IANA.AS] IANA, "Autonomous System (AS) Numbers", . [RFC1930] Hawkinson, J. and T. Bates, "Guidelines for creation, selection, and registration of an Autonomous System (AS)", BCP 6, RFC 1930, March 1996. [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", RFC 4272, January 2006. 8. Acknowledgements The author would like to acknowledge Christopher Morrow, Jason Schiller, and John Scudder for their advice on how to pursue this change. The author would also like to thank Brian Dickson, David Farmer, Jeffrey Haas, Nick Hilliard, Joel Jaeggli, Warren Kumari, and Jeff Wheeler for their comments and suggestions. Author's Address Jon Mitchell Microsoft Corporation One Microsoft Way Redmond, WA 98052 USA EMail: Jon.Mitchell@microsoft.com Mitchell Best Current Practice [Page 4] ========================================================================= Internet Engineering Task Force (IETF) J. Haas Request for Comments: 7300 Juniper Networks BCP: 6 J. Mitchell Updates: 1930 Microsoft Corporation Category: Best Current Practice July 2014 ISSN: 2070-1721 Reservation of Last Autonomous System (AS) Numbers Abstract This document reserves two Autonomous System Numbers (ASNs) at the end of the 16-bit and 32-bit ranges, described in this document as "Last ASNs", and provides guidance to implementers and operators on their use. This document updates Section 10 of RFC 1930. Status of This Memo This memo documents an Internet Best Current Practice. This document is a product of the Internet Engineering Task Force (IETF). It has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on BCPs is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7300. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Haas & Mitchell Best Current Practice [Page 1] RFC 7300 Last AS Reservation July 2014 1. Introduction Over a decade ago, IANA reserved the last Autonomous System Number (ASN) of the 16-bit ASN range, 65535, with the intention that it not be used by network operators running BGP [RFC4271]. Since the introduction of "BGP Support for Four-Octet Autonomous System (AS) Number Space" [RFC6793], IANA has also reserved the last ASN of the 32-bit autonomous system number range, 4294967295. This reservation has been documented in the IANA "Autonomous System (AS) Numbers" registry [IANA.AS]. Although these "Last ASNs" border on Private Use ASN [RFC6996] ranges, they are not defined or reserved as Private Use ASNs by [IANA.AS]. This document describes the reasoning for reserving Last ASNs and provides guidance both to operators and to implementers on their use. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 3. Reasons for Reservation of the Last ASNs A subset of the BGP communities of ASN 65535, the last ASN of the 16-bit range, are reserved for use by Well-known Communities as described in [RFC1997] and [IANA.WK]. Although this is not currently true of ASN 4294967295, if there is a future need for another Special Use ASN that is not designed to be globally routable, or for the associated BGP communities of such an ASN, ASN 4294967295 could be a valid candidate for such purpose. This document does not prescribe any such Special Use to this ASN at the time of publication. 4. Operational Considerations Operators SHOULD NOT use these Last ASNs for any other purpose or as Private Use ASNs. Operational use of these Last ASNs could have undesirable results. For example; use of AS 65535 as if it were a Private Use ASN, may result in inadvertent use of BGP Well-known Community values [IANA.WK], causing undesirable routing behavior. Last ASNs MUST NOT be advertised to the global Internet within AS_PATH or AS4_PATH attributes. Operators SHOULD filter Last ASNs within the AS_PATH and AS4_PATH attributes. Haas & Mitchell Best Current Practice [Page 2] RFC 7300 Last AS Reservation July 2014 5. Implementation Considerations While Last ASNs are reserved, they remain valid ASNs from a BGP perspective. Therefore, implementations of BGP [RFC4271] SHOULD NOT treat the use of Last ASNs as any type of protocol error. However, if a Last ASN is configured as the local AS, implementations MAY generate a warning message indicating improper use of a reserved ASN. Implementations that provide tools that filter Private Use ASNs within the AS_PATH and AS4_PATH attributes MAY also include Last ASNs. 6. IANA Considerations IANA has reserved last Autonomous System number 65535 from the "16-bit Autonomous System Numbers" registry for the reasons described in this document. IANA has also reserved last Autonomous System number 4294967295 from the "32-bit Autonomous System Numbers" registry for the reasons described in this document. These reservations have been documented in the IANA "Autonomous System (AS) Numbers" registry [IANA.AS] and the IANA "Special-Purpose Autonomous System (AS) Numbers" registry [IANA.SpecialAS]. 7. Security Considerations This document does not introduce any additional security concerns in regards to usage of Last ASNs. Although the BGP is designed to allow usage of Last ASNs, security issues related to BGP implementation errors could be triggered by Last ASN usage. 8. References 8.1. Normative References [IANA.AS] IANA, "Autonomous System (AS) Numbers", . [IANA.SpecialAS] IANA, "Special-Purpose Autonomous System (AS) Numbers", . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Haas & Mitchell Best Current Practice [Page 3] RFC 7300 Last AS Reservation July 2014 [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, January 2006. [RFC6793] Vohra, Q. and E. Chen, "BGP Support for Four-Octet Autonomous System (AS) Number Space", RFC 6793, December 2012. 8.2. Informative References [IANA.WK] IANA, "Border Gateway Protocol (BGP) Well-known Communities", . [RFC1997] Chandrasekeran, R., Traina, P., and T. Li, "BGP Communities Attribute", RFC 1997, August 1996. [RFC6996] Mitchell, J., "Autonomous System (AS) Reservation for Private Use", BCP 6, RFC 6996, July 2013. Haas & Mitchell Best Current Practice [Page 4] RFC 7300 Last AS Reservation July 2014 Appendix A. Acknowledgments The authors would like to thank Michelle Cotton and Elwyn Davies for encouraging the proper documentation of the reservation of these ASNs, and David Farmer for his contributions to the document. Authors' Addresses Jeffrey Haas Juniper Networks EMail: jhaas@juniper.net Jon Mitchell Microsoft Corporation One Microsoft Way Redmond, WA 98052 USA EMail: Jon.Mitchell@microsoft.com Haas & Mitchell Best Current Practice [Page 5]