Child pages
  • Peering Interface Configuration
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 23 Next »

To ensure that your connection to the INX is easy, as well as secure, we have created a set of templates for the configuration of various types of hardware in common use at the exchange point.

Although we do filter specific types of Layer-2 frames, we still encourage peers to keep their ports clean, and may insist on this before moving you out of quarantine.

 

Cisco IOS
interface GigabitEthernet0/1
ip address 196.223.x.x 255.255.255.0
ipv6 address 2001:43f8:1fx::y/64
description PEERING:: *INX
no ip redirects
no ip proxy-arp
no cdp enable
no ip directed-broadcast
no mop enable
no keepalive 
no udld mode aggressive
ipv6 nd ra suppress
Cisco XR
interface <INT>
 description PEERING:: *INX
 mtu 9216
 ipv4 address 196.223.x.x 255.255.255.0
 ipv4 verify unicast source reachable-via any
 ipv4 unreachables disable
 ipv6 nd suppress-ra
 ipv6 nd dad attempts 0
 ipv6 verify unicast source reachable-via any
 ipv6 address 2001:43f8:1fx::y/64
 ipv6 unreachables disable
 load-interval 30
Juniper
interfaces {
    ge-0/0/0 {
        description "PEERING:: *INX”;
        unit 0 {
             family inet {
                 no-redirects;
                 address 196.223.x.x/24;
             }
            family inet6 {
                 address 2001:43f8:1fx::y/64
            }
        }
} 
Mikrotik
/interface ethernet set ether1 comment="PEERING:: *INX"
/ip neighbor discovery set ether1 discover=no
/ip address add interface=ether1 address=196.223.x.y/24
/ipv6 address add interface=ether1 address=2001:43f8:1fx::y/64 advertise=no
/tool romon port disable numbers=<Interfacenumber of Ethernet>

 

  • No labels