Figure B2.
An illustration of how protection depends on how customers connect to the Routing Trust Zone. Customer L receives two routes for J’s prefix, a VERIFIED route via M|$_{6}$| and an (unverified) hijacked route from X via K. If L does not prefer the VERIFIED route via M|$_{6}$| (L M|$_{6}$| M|$_{5}$| J), L may select the hijacked route (L K X J) because it has the same AS path length.