Child pages
  • Peering Interface Configuration
Skip to end of metadata
Go to start of metadata

To ensure that your connection to the INX is easy, as well as secure, we have created a set of templates for the configuration of various types of hardware in common use at the exchange point.

Although we do filter specific types of Layer-2 frames, we still encourage peers to keep their ports clean, and may insist on this before moving you out of quarantine.

 

Cisco IOS
interface GigabitEthernet0/1
ip address 196.223.x.x 255.255.255.0
ipv6 address 2001:43f8:1fx::y/64
description PEERING:: *INX
no ip redirects
no ip proxy-arp
no cdp enable
no ip directed-broadcast
no mop enable
no keepalive 
no udld mode aggressive
ipv6 nd ra suppress
Cisco XR
interface <INT>
 description PEERING:: *INX
 mtu 9216
 ipv4 address 196.223.x.x 255.255.255.0
 ipv4 verify unicast source reachable-via any
 ipv4 unreachables disable
 ipv6 nd suppress-ra
 ipv6 nd dad attempts 0
 ipv6 verify unicast source reachable-via any
 ipv6 address 2001:43f8:1fx::y/64
 ipv6 unreachables disable
 load-interval 30
Juniper
interfaces {
    ge-0/0/0 {
        description "PEERING:: *INX”;
        unit 0 {
             family inet {
                 no-redirects;
                 address 196.223.x.x/24;
             }
            family inet6 {
                 address 2001:43f8:1fx::y/64
            }
        }
} 
Mikrotik
/interface ethernet set ether1 comment="PEERING:: *INX"
/ip neighbor discovery set ether1 discover=no
/ip address add interface=ether1 address=196.223.x.y/24
/ipv6 address add interface=ether1 address=2001:43f8:1fx::y/64 advertise=no
/tool romon port disable numbers=<Interfacenumber of Ethernet>