Port Configuration
Port configuration requirements for members
Built Secure
With our roots in cyber-security, we would like to do our part to create
a more secure and more reliable internet.
To obtain this, we have several requirements and security measures in place ensuring secure
operation of our platform to create a great environment to exchange traffic.
Media Configuration
To ensure reliable services, the physical media must be set up correctly on your interface towards ERA-IX
- Auto-negotiation: Disabled (speed forced to physical media speed).
- MTU (L3): 1500 Bytes
Allowed Traffic
For optimal hygiene in our peering LAN, only the following ether types are allowed to enter our peering LAN:
0x0800
IPv4, IPv4 internet traffic.0x0806
ARP, ARP for IPv4.0x08DD
IPv6, IPv6 internet traffic.
Ether types not present in this list are strictly forbidden and will be dropped by our platform.
Link-local Protocols
Any link-local protocols must be disabled on the interface towards ERA-IX (such as LLDP, CDP, STP, flow-control).
Mac-address Security
We maintain an exact administration of which mac-address belongs where on
our network.
When getting connected, during the testing phase, ERA-IX will administer the mac-address.
mac-address changes must always be communicated for the administrative records to be
updated.
Any traffic originating from a mac-address not explicitly administered source will be dropped by
our platform.
When our peering LAN has to traverse multiple switches inside the members network, ensure any
intermediary switches do not send out any packets and no packets not destined for the peering
LAN end up being sent to ERA-IX.
ARP Security
The members router must not reply to ARP requests not destined for their assigned IP address (disable proxy-arp) and must only configure the IP address assigned to them by ERA-IX. Any violating ARP packets which do not match our administrative records will be dropped and an incident will be logged to review.
Route-server Filtering
By default, for all members, our route-servers are configured to drop IRR Invalid and RPKI Invalid routes. IRR is based on the AS-SET of the member and registrars enabled at ERA-IX's discretion to provide optimal security with minimum interference. IRR filters are refreshed automatically once per hour on our route-servers.
Peering LAN route propagation
Announcing our peering LAN prefixes to the internet is prohibited and
members must maintain correct routing policy to ensure the route is not advertised to the
DFZ.
We strongly recommend not importing the peering LAN into IGP to prevent accidental
propagation and unwanted traffic from being sent to the peering LAN.