Child pages
  • Peering Interface Configuration

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

To ensure that your connection to the INX is easy, as well as secure, we have created a set of templates for the configuration of various types of hardware in common use at the exchange point.

Although we do filter specific types of Layer-2 frames, we still encourage peers to keep their ports clean, and may insist on this before moving you out of quarantine.


Code Block
titleCisco IOS
interface GigabitEthernet0/1
ip address 196.223.x.x
ipv6 address 2001:43f8:1fx::y/64
description PEERING:: *INX
no ip redirects
no ip proxy-arp
no cdp enable
no ip directed-broadcast
no mop enable
no keepalive 
no udld mode aggressive
ipv6 nd ra suppress

Code Block
titleCisco XR
interface <INT>
 description PEERING:: *INX
 mtu 9216
 ipv4 address 196.223.x.x
 ipv4 verify unicast source reachable-via any
 ipv4 unreachables disable
 ipv6 nd suppress-ra
 ipv6 nd dad attempts 0
 ipv6 verify unicast source reachable-via any
 ipv6 address 2001:43f8:1fx::y/64
 ipv6 unreachables disable
 load-interval 30

Code Block
interfaces {
    ge-0/0/0 {
        description "PEERING:: *INX”;
        unit 0 {
             family inet {
                 address 196.223.x.x/24;
            family inet6 {
                 address 2001:43f8:1fx::y/64

Code Block
/interface ethernet set ether1 comment="PEERING:: *INX"
/ip neighbor discovery set ether1 discover=no
/ip address add interface=ether1 address=196.223.x.y/24
/ipv6 address add interface=ether1 address=2001:43f8:1fx::y/64 advertise=no
/tool romon port disable numbers=<Interfacenumber of Ethernet>