Child pages
  • Layer-2 Filtering Policy
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

In order to help maintain hygiene across the peering fabric, all peering participant ports are subjected to a standard layer-2 filtering policy to limit frames that are considered unwanted at the peering fabric.  Below is a list of frames that are filtered (dropped) by default.  This list is revised as necessary.

Layer-2 filtering
ethernet-destination-address 01:80:c2:00:00:00 ;
ethernet-destination-address 01:00:0c:cc:cc:cc ; snap-type 0x2000 ;
ethernet-destination-address 01:00:0c:cc:cc:cc ; snap-type 0x2003 ;
ethernet-destination-address 01:00:0c:cc:cc:cd ; 
ethernet-destination-address 01:00:0c:cc:cc:cc ; snap-type 0x2004 ;
ethernet-destination-address 01:00:0c:cc:cc:cc ; snap-type 0x0111 ;
ethernet-destination-address 01:00:0c:cc:cc:cc ; snap-type 0x0104 ;
ethernet-destination-address 00:e0:2b:00:00:00 ; snap-type 0x00bb ;
ethernet-destination-address 01:80:c2:00:00:0e ; ethernet-type 0x88cc
ethernet-destination-address 01:80:c2:00:88:bf ; ethernet-type 0x88bf 
ethernet-type 0x9998
ethernet-type 0x999a

In general peers are expected to send only  IPv4 (0x0800 ), IPv6 (0x86dd ) and ARP (0x0806) ethertypes.  Other frames types will be dropped.

Do not send Proxy ARP or link-local Traffic. only send unicast, ARP and IPv6 ND.

Mac Security
To keep security at the highest level we implement Layer 2 MAC filtering on the INX-ZA peering fabric. This is to help prevent unauthorised traffic from entering the exchange. Each peering port/bundle is restricted to a single MAC address and is staticlly locked down, meaning it will not learn a new MAC if the old one times out.
If you require the MAC on your port to change please email ops @ inx.net.za to schedule the time the change will take place and our team will be on standby



  • No labels