Wed Jan 04, 2023 10:53 pm
I have two Mikrotik routers, each has their own 1GB WAN, a 1GB cross-connect, and each has their own AWS VPN tunnel, all with BGP sessions. When I first set this up, I put the BGP routes from our WAN provider into a separate route table and the routes from the cross-connect into that route table as well. This was fine because it's a 0.0.0.0/0 route and I really didn't need their customer's IP since I don't have a second WAN. Now with adding the AWS VPN, I'm wondering if I've made a mistake. Does everyone use one main route table for everything? Is it common to protect routes using allow list route filters or assumed you won't get a faulty route from an upstream? I've found a lot of setup articles while not anything on the day to day management and all the common bgp issues that can trip up the route tables or cause a lose of connectivity. I'm on v7 if that changes the answer or suggestions.