Black Hole Routing using the NULL interface

This How To covers something called Black Hole Routing using the NULL interface in Cisco IOS.

The entire YouTube network went down in 2009, across the globe, for about two hours — thanks to a mistake made by an ISP in Pakistan. That mistake involved a black hole route accidentally distributed around the world.

While you may not have a network as large or as critical as YouTube to manage, unexpected network downtime or lost network traffic is never a good thing. That’s why you should understand what a black hole route is, how it can help you — and how it could hurt you.

What happened with YouTube?

If you haven’t already heard what happened with the YouTube incident, it’s a very interesting story from an IP routing and troubleshooting perspective. Because plenty of articles are available that discuss the incident, I won’t go into detail. But if you need a quick review, check out these resources:

What is a Black Hole Route?

In the 1979 movie The Black Hole, what went into the black hole didn’t come out. It was a scary thing that all the characters wanted to avoid. In the world of IP routing, a black hole is also a term with a negative connotation — trust me, no one wants traffic going there either.

In its simplest form, a black hole exists on a network when a router directs network traffic to a destination that just “throws away” the traffic. The classic interface used on a Cisco router to do this is the null0 interface.

In mathematics, null means to have zero numbers in a set. In computers and networking, however, null doesn’t mean zero; it means no value or nothing.

A Cisco IOS router also has an interface called null0. When traffic goes to that interface, the router just discards it. Thus, the null interface on the Cisco router is the “black hole.”

Obviously, you can direct traffic that you want to get rid of to a black hole. In fact, this is what happened with the Pakistani ISP and YouTube’s data. While there are many ways to discard traffic, I suspect what happened was that the IPS sent all YouTube traffic to null0 and then accidentally shared the route with other ISPs throughout the Internet using Border Gateway Protocol (BGP); all YouTube traffic ended up discarded, all around the world.

Black hole routes can help you by dropping malicious traffic if you’re under attack, such as in the case of a DDoS attack or a worm attack. While you may be able to do this just as well with an access control list (ACL) since routing works in the forwarding path of the Cisco router, you can use the black hole route to drop the same traffic while incurring less of a performance impact on the router. (Because the ACL processing is higher in the order of operations (search this on the How To course), the ACL would serve the same purpose but take more router resources to do it.)

We typically configure black hole routes in conjunction with BGP; BGP is the routing protocol of the Internet, and most of the malicious traffic is on the Internet. However, anyone can configure a black hole route with just a single statement.

Here’s the simplest form of a black hole route:

Cell_Router(config)# ip route 10.1.1.1 255.255.255.0 null0

This statement sends all traffic arriving on this router to the null0 interface — in effect, discarding it and sending it to the black hole. Let’s look at an example of using this in a simple network.

Let’s say your Cisco IOS router connects you to the Internet, and your network users are using an online P2P file-sharing service that you don’t want them to use. Rather than creating an ACL, using content filtering, or an application-based firewall, you could simply drop all traffic to that domain by looking up the IP addresses used and entering a route to null0.

You could also redistribute this route into your dynamic routing protocol and have it sent to all other routers on your network. Then, all routers would send traffic to your router, and your router would drop that traffic.

Keep in mind that if you’re using this approach, you don’t want to alert malicious users that you’re blocking their traffic. You could configure the following on the null0 interface:

Cell_Router(config)# int null0
Cell_Router(config-if)# no ip unreachables

Of course, black holes as bad if you’re on the other end of this discussion and you’re the one sending the traffic, but if you’re sending malicious traffic, your network deserves to go to a black hole.

On the other hand, if it’s a mistake, as was the case with YouTube, having traffic sent to a black hole could cost you and your company significantly.

We hope this helps!

Leave a Comment

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top