Network Portability: Build a Personal AS Now

Blog 13 min read

Running an Autonomous System with 80,000 peers globally is no longer exclusive to Tier 1 ISPs. This guide argues that individuals can now bypass traditional provider lock-in by deploying provider-independent addressing on commodity hardware. You will learn how to secure IPv6 prefixes through sponsoring LIRs, architect a dual-tier network using FreeBSD and FRR, and deploy personal routing infrastructure that survives provider migrations.

Historically, moving servers meant renumbering entire networks due to provider-assigned IPs binding identity to infrastructure. Larvitz Blog data confirms that modern Local Internet Registries now allow hobbyists to obtain their own AS numbers, decoupling address space from upstream carriers. By using open-source tools like Free Range Routing, operators can announce routes directly to the Default-Free Zone without proprietary hardware costs.

The article details obtaining resources from RIPE via sponsorship rather than costly direct membership. It walks through configuring BGP sessions, establishing GRE tunnels for remote subnets, and solving complex routing scenarios where servers require simultaneous access to multiple address spaces. This approach transforms network architecture from a static liability into a portable asset, enabling smooth migration across cloud providers while maintaining consistent DNS and firewall policies.

The Strategic Value of Provider-Independent Addressing

Autonomous System Definition: Single Routing Policy via BGP

ARIN data shows an Autonomous System groups IP prefixes under one routing policy to form internet routing's base. ARIN's fee schedule This definition separates an AS from simple networks that lack external path control. The core technical function enforces how a network sends and receives data from other systems. According to Medium, BGP serves as the sole Exterior Gateway Protocol for exchanging this routing information today. Without this protocol, a personal network cannot connect to the public internet or enforce specific path preferences. As reported by Larvitz Blog, roughly 80,000 autonomous systems operate on the public internet as of 2026. These entities range from massive Tier 1 backbones to small experimental networks running on single virtual machines. The sheer count indicates low barriers to entry for individuals willing to manage their own address space.

FeatureSimple NetworkAutonomous System
AddressingProvider-assignedProvider-independent
Policy ControlNone (Default Accept)Explicit Path Selection
PortabilityLow (Requires Re-numbering)High (Tunnel Endpoints Only)

Operators gain portability but assume full responsibility for prefix hygiene and upstream coordination. InterLIR recommendations suggest sponsoring LIRs enable resource access without requiring full RIPE NCC membership fees. The trade-off is operational complexity; a misconfigured blackhole route can silently drop traffic for unassigned subnets within the prefix. Most operators overlook the necessity of cryptographically binding prefixes to AS numbers via RPKI ROAs before announcement. Failure to publish these authorizations results in route rejection by strict upstream peers.

Provider-Independent Addressing for Zero-per Downtime Migration

Larvitz Blog, migrating a server requires only a tunnel endpoint update to restore traffic without service reconfiguration. This architectural approach decouples logical addressing from physical infrastructure using provider-independent prefixes. Operators maintain constant IPv6 assignments regardless of the underlying hosting vendor. Moving workloads between Azure and Google Cloud becomes a matter of updating BGP next-hops rather than rewriting application configs. The mechanism relies on GIF tunnels to extend the personal AS reachability over existing provider links. Traffic flows smoothly because the destination address presented to clients never changes during the transition.

Migration PhaseProvider-Assigned IPProvider-Independent IP
DNS UpdateRequiredNot Required
Firewall RulesRewrite NeededNo Change
ReputationLostPreserved

The limitation is that upstream providers must accept customer prefixes, which not all allow by default. Some networks filter unannounced space, requiring explicit coordination or transit agreements. Based on Larvitz Blog, simplifying architecture across multiple providers via this method reduces operational complexity significantly. However, the initial setup demands rigorous RPKI ROA publication to prevent route rejection by strict peers. Operators gain immunity to vendor lock-in while retaining full control over routing policies. This strategy transforms migration from a multi-day outage event into a sub-second BGP convergence. The trade-off is the administrative overhead of maintaining AS resources and monitoring global routing tables.

Provider-assigned addresses tie infrastructure to a specific host, forcing total reconfiguration upon migration per Larvitz Blog data. These addresses bind DNS records, firewall rules, and reputation scores to the original vendor. Moving a server requires updating every dependent system because the address itself signals the location. This tight coupling creates significant operational friction during cloud transitions or disaster recovery events. In contrast, provider-independent resources allow an operator to maintain constant addressing regardless of physical placement. The mechanism relies on decoupling the logical identity from the transport layer using BGP announcements.

FeatureProvider-AssignedProvider-Independent
PortabilityNone; requires re-IPFull; address follows user
ReconfigurationExtensive manual updatesTunnel endpoint only
Vendor Lock-inHigh barrier to exitEliminated entirely
Cost ModelIncluded in hosting feeRequires LIR sponsorship

according to SQ Magazine, substantial providers hold 96.5% of customer-to-provider routing accuracy, dominating the path environment. Relying on their assigned space cedes control of your routing policy to these giants. The limitation is that obtaining independent space requires coordination with a sponsoring entity like InterLIR rather than simple activation. Operators must weigh the upfront administrative effort against long-term architectural flexibility. Avoiding vendor lock-in reduces costs by utilizing free operating systems like FreeBSD instead of commercial licenses according to Larvitz Blog data. The trade-off is the initial complexity of managing global reachability yourself.

Architecting a Dual-Tier Network with FreeBSD and FRR

FreeBSD Kernel Modules gif0 and gre0 for Tunneling

FreeBSD activates if_gif and if_gre kernel modules to build protocol-specific encapsulation interfaces. The gif0 interface links the VPS at 203.0.113.10 using IPv6-in-IPv4 encapsulation defined by Protocol 41. This approach adds exactly 20 bytes of overhead to standard IPv6 headers, representing a fixed cost for tunneling efficiency. Conversely, the gre0 interface connects to transit provider iFog at 198.51.100.44, satisfying upstream requirements for Generic Routing Encapsulation. Such a dual-approach architecture separates internal distribution from external peering constraints. System administrators must load these drivers explicitly via `kld_list` in `/etc/rc. Conf` before interface configuration takes effect.

FeatureGIF (gif0)GRE (gre0)
ProtocolIPv6-in-IPv4 (41)Generic (47)
TargetDownstream VPSUpstream Transit
Overhead20 BytesVariable
Use CaseInternal SubnetsProvider Peering

Kernel dependency creates a hard constraint; unlike user-space daemons, these modules require system-level loading and cannot be hot-swapped without potential service interruption during module updates. Traffic engineering capabilities remain restricted to static routing within the tunnel scope unless paired with dynamic protocols.

Configuring FRR Version 10.5.1 on FreeBSD router01

FRR version 10.5.1 starts the BGP daemon on router01 to manage AS201379 peering sessions. Operators assign physical interface vtnet0 IPv4 address 198.51.100.10/24 and IPv6 address 2001:db8:100::96/64 to establish connectivity before launching routing processes. The mechanism demands loading if_gif and if_gre kernel modules to support tunnel encapsulation for downstream subnets. InterLIR reports that misconfigured tunnel dependencies frequently prevent interface initialization, causing the FRR daemon to fail neighbor establishment with upstream providers AS34927 and AS209735. A significant drawback involves the blackhole route for the aggregate prefix 2a06:9801:1c::/48; omitting this static reject entry creates routing loops for unassigned address space within the block. Network engineers must verify that the GIF tunnel to vps01 at 203.0.113.10 reaches the "up" state prior to announcing specific /64 subnets via BGP. Management complexity grows when handling dual-stack requirements across heterogeneous upstreams.

  • GRE tunnels satisfy strict provider mandates for session establishment.
  • GIF interfaces offer reduced overhead for internal distribution logic.
  • Static blackhole routes prevent leakage of unallocated prefix segments.
  • Kernel module loading order dictates successful interface binding.
  • Proper sequencing ensures routers advertise reachable paths rather than accepting peers silently.

Failure to sequence these operations correctly results in a router that accepts peer connections but advertises no reachable paths. The operational consequence is a silent failure mode where the personal AS appears active in global tables yet drops all inbound traffic destined for tunneled resources.

MSS Clamping Values to Prevent Tunnel Fragmentation

Setting Maximum Segment Size to 1440 bytes for VPS tunnels prevents fragmentation failures. Standard IPv6 packets exceed the payload capacity of encapsulated links when headers expand. GIF encapsulation consumes 20 bytes, requiring operators to clamp TCP handshakes below the physical MTU limit. Failure to adjust this value forces routers to fragment traffic, introducing latency and packet loss risks.

VPS GIF144020 bytes
DC GIF1140Variable
GRE140024 bytes

DC tunnels require a stricter 1140-byte limit due to complex nesting. GRE connections to transit providers like iFog demand a 1400-byte ceiling per KEY DATA POINTS data. The limitation is reduced single-stream throughput, yet connectivity remains stable across heterogeneous paths. Operators must configure pf or ipfw rules to rewrite SYN-ACK packets dynamically at the edge. Neglecting this step causes silent drops that standard ICMP filtering often masks from monitoring systems.

Deploying a Personal Autonomous System on FreeBSD

Acquiring AS Numbers and IPv6 Prefixes via Sponsoring LIR

Horizontal bar chart ranking Customer-to-Provider accuracy at 96.5% above Peer-to-Peer at 82.8%, alongside a metric card detailing deployment statistics for personal AS on FreeBSD.
Horizontal bar chart ranking Customer-to-Provider accuracy at 96.5% above Peer-to-Peer at 82.8%, alongside a metric card detailing deployment statistics for personal AS on FreeBSD.

Individuals bypass full RIPE NCC membership by submitting a request form with an intended use case to a sponsoring LIR. Data shows public Autonomous System Numbers occupy the 1 to 64,495 range assigned by Regional Internet Registries. The mechanism requires the sponsor to validate the operator's identity before creating aut-num and inet6num objects in the RIPE database. ARIN reports that fee structures often scale with aggregate block size, though specific waiver categories exist for small entities. Creating these database entries binds the AS201379 identity to the 2a06:9801:1c::/48 prefix cryptographically.

  1. Submit the sponsoring LIR application detailing the network topology.
  2. Define the aut-num object to establish routing policy authority. 3.

FIB 0 routes traffic via vtnet0 to the VPS provider upstream, while FIB 1 routes traffic via gif0 to the BGP router. Data shows this separation isolates provider management traffic from customer BGP-addressed jail traffic. Operators must configure `/etc/rc. Conf` to load `if_gif` modules before assigning IPv6-in-IPv4 tunnel endpoints. The mechanism relies on distinct routing table identifiers to enforce policy decisions at the kernel level. InterLIR reports that failing to separate these planes causes return-path asymmetry during failover events. A significant limitation involves the complexity of maintaining synchronized RPKI ROA states across multiple forwarding instances. Implement dual-FIB logic using the following numbered procedure:

  1. Define physical interface `vtnet0` with the provider-assigned IPv6 prefix.
  2. Create `gif0` tunnel targeting the remote VPS endpoint IP address.
  3. Assign a static route for the personal AS201379 block to the tunnel interface.
  4. Enable `frr` service to advertise the prefix via the GRE upstream session.

The trade-off is increased memory consumption on the FreeBSD VM due to duplicate neighbor state storage. Most operators observe that strict FIB separation prevents accidental leakage of private routing updates into the public Default-Free Zone. This architecture ensures that migration of the underlying VPS requires only a tunnel endpoint update. Traffic flows immediately upon reconvergence without renumbering internal services.

Operational Lessons for Stable BGP and Tunnel Management

per MSS Clamping Formulas for GIF and GRE Tunnel Headers, this overhead necessitates subtracting both the IPv6 header (40 bytes) and TCP header (20 bytes) from the link MTU. The mechanism forces intermediate routers to rewrite SYN packet headers, preventing fragmentation that would otherwise drop traffic inside the tunnel. However, InterLIR reports that misconfigured clamping values frequently cause connection timeouts when upstream paths impose stricter limits than the tunnel endpoint. This constraint means network engineers must calculate distinct Maximum Segment Size values for every tunnel type rather than applying a global default.

Tunnel TypeTarget MSSProtocol Overhead
VPS GIF144020 bytes
DC GIF1140Variable
GRE140024 bytes
Dashboard showing BGP path accuracy rates where c2p leads at 96.5%, followed by s2s at 90.3% and p2p at 82.8%. Includes a metric highlighting that 30% of enterprises will automate over half their operations by 2027.
Dashboard showing BGP path accuracy rates where c2p leads at 96.5%, followed by s2s at 90.3% and p2p at 82.8%. Includes a metric highlighting that 30% of enterprises will automate over half their operations by 2027.

GRE tunnels introduce additional header complexity compared to GIF, further reducing the available payload space for user data. Operators observing high retransmission rates should verify that MSS clamping rules match the specific encapsulation protocol in use. A hidden tension exists between maximizing throughput and ensuring compatibility with diverse upstream providers who may filter oversized packets. Neglecting these calculations results in silent packet drops that standard monitoring tools often miss until application layers fail. Adjusting the TCP header allowance dynamically based on tunnel depth prevents these opaque failures. Asymmetric routing failures occur when reply packets ignore the arrival interface, forcing operators to deploy reply-to rules in PF.

Future automation trends suggest 30% of enterprises will automate over half their network operations by 2027, yet personal AS deployments often lag in script sophistication.

Bogon filtering prevents accepting nonsense routes that black-hole traffic within the default-free zone. As reported by Lessons Learned, this practice remains critical for small networks to maintain routing table integrity. The mechanism involves rejecting prefixes reserved for private use or non-existent assignments at the BGP peer level. Operators who skip this step risk propagating invalid paths that alter connectivity for downstream peers. However, rigid filtering without dynamic updates creates fragility when legitimate address space changes ownership unexpectedly. This trade-off demands a balanced approach where static lists are supplemented by real-time validation feeds. Routing policy precision directly impacts how neighbors perceive path legitimacy during convergence events.

Neglecting these checks invites avoidable outages in production environments.

About

Vladislava Shadrina Customer Account Manager at InterLIR brings a unique perspective to the complexities of running an Autonomous System. While her background lies in architecture, she applies that same structural precision to navigating the global IP resource environment daily. At InterLIR, a Berlin-based marketplace specializing in IPv4 redistribution, Vladislava guides clients through acquiring essential network assets like AS numbers and IP prefixes. Her role directly connects to this article's thesis because she witnesses firsthand how sponsoring Local Internet Registries have democratized access for individuals. She understands that modern networking requires not just technical skill with tools like FreeBSD and FRR, but also reliable access to clean, reputable address space. By bridging the gap between complex BGP requirements and customer needs, Vladislava ensures that even small-scale operators can successfully announce their routes to the Default-Free Zone. Her experience confirms that operating an AS is no longer exclusive to massive ISPs, empowering a new generation of network architects to build on the public internet.

Conclusion

Scaling autonomous systems reveals that inferred routing policies collapse under the weight of dynamic global changes, turning minor configuration drift into widespread connectivity loss. While automation promises efficiency, relying on static bogon lists or unverified relationship data creates a fragile foundation where operational costs spike dramatically during convergence events. The real danger lies not in the technology itself, but in the false confidence operators place in algorithms that cannot distinguish between a legitimate reassignment and a hijacked prefix without human context.

Organizations must mandate a manual audit of all AS relationships before enabling any automated path selection logic by the end of Q3. Blindly trusting inference engines invites instability that no amount of downstream filtering can fully mitigate. You need a hybrid model where real-time validation feeds supplement static rules, ensuring your border routers reject invalid paths without sacrificing agility. This shift from passive reliance to active verification is the only way to sustain integrity as the routing table expands.

Start this week by cross-referencing your current BGP peer configurations against live IRR records to identify any mismatched relationship types. This single action exposes hidden risks in your perimeter defense before they trigger a cascade failure. Do not wait for an outage to validate your topology; the cost of prevention is negligible compared to the revenue loss from a black-holed customer base.

Frequently Asked Questions

What happens if I forget to publish RPKI ROAs for my prefix?
Strict upstream peers will reject your routes entirely. Without cryptographic binding, route rejection occurs because operators filter unannounced space by default to maintain network security and routing integrity globally.
Can individuals get AS numbers without paying full RIPE NCC membership fees?
Yes, individuals can use sponsoring LIRs to access resources. This approach avoids costly direct membership fees while allowing hobbyists to obtain AS numbers and IPv6 prefixes for personal routing projects easily.
How does provider-independent addressing change server migration procedures?
Migration requires only a tunnel endpoint update to restore traffic. You avoid rewriting application configs or DNS records since logical addressing stays decoupled from physical infrastructure during cloud provider transitions completely.
What encapsulation protocol extends personal AS reachability over existing provider links?
GIF tunnels extend reachability using IPv6-in-IPv4 encapsulation. This mechanism allows servers to receive real globally routable addresses from your prefix while keeping existing provider-assigned IPv6 fully operational simultaneously.
Why do some networks filter customer prefixes by default?
Networks filter unannounced space requiring explicit coordination or transit agreements. Some providers do not accept customer prefixes by default, necessitating rigorous RPKI ROA publication to prevent route rejection by strict peers.
Vladislava Shadrina
Vladislava Shadrina
Customer Account Manager