|
1 | 1 | --- |
2 | | -id: routeServerOptOut |
3 | | -title: Route Server Opt-Out |
| 2 | +id: routeServer |
| 3 | +title: Route Servers |
4 | 4 | sidebar_position: 5 |
5 | | -description: Peering relationships through the route server, including methods to opt-out of peering with specific networks. |
| 5 | +description: Technical information about OpenIX Route Servers, including ASN, IP addresses, and BGP community controls for policy management. |
6 | 6 | --- |
7 | 7 |
|
8 | | -If a participant does not wish to peer with specific other networks via the route server, they can use BGP community controls to instruct the route server accordingly (as mentioned above). Alternatively, they may choose not to use the route server at all and only establish direct sessions with selected peers. Using the exchange does not force any participant to peer with everyone; it simply provides the opportunity. |
| 8 | +OpenIX provides route server infrastructure to simplify multilateral peering. By establishing BGP sessions with the route servers, participants can exchange routes with multiple peers through a single connection rather than maintaining individual bilateral sessions. |
| 9 | + |
| 10 | +## Route Server ASN |
| 11 | + |
| 12 | +OpenIX Route Servers operate under **ASN 4969**. |
| 13 | + |
| 14 | +## Route Servers |
| 15 | + |
| 16 | +### OpenIX Beirut |
| 17 | + |
| 18 | +| Route Server | IPv4 | IPv6 | |
| 19 | +| ----------------- | ---------------- | ------------------------ | |
| 20 | +| OpenIX Beirut RS1 | `23.181.208.251` | `2620:98:e00e:9::4969:1` | |
| 21 | +| OpenIX Beirut RS3 | `23.181.208.253` | `2620:98:e00e:9::4969:3` | |
| 22 | + |
| 23 | +Participants should establish BGP sessions with both route servers for redundancy. |
| 24 | + |
| 25 | +## Policy Control |
| 26 | + |
| 27 | +OpenIX Route Servers support policy control through BGP Standard Communities and BGP Large Communities. Members may tag their routes to control route announcements via the route servers. |
| 28 | + |
| 29 | +### Route Announcement Control |
| 30 | + |
| 31 | +| Action | Standard Community | Large Community | |
| 32 | +| ----------------------------------------------- | ------------------ | ---------------- | |
| 33 | +| Block announcement of a route to a certain peer | `0:peer-as` | `4969:0:peer-as` | |
| 34 | +| Announcement of a route to a certain peer | `4969:peer-as` | `4969:1:peer-as` | |
| 35 | +| Block announcement of a route to all peers | `0:4969` | `4969:0:0` | |
| 36 | +| Announcement of a route to all peers | `4969:4969` | `4969:1:4969` | |
| 37 | + |
| 38 | +### AS-Prepending to All Peers |
| 39 | + |
| 40 | +| Community type | Prepend ASN one time | Prepend ASN two times | Prepend ASN three times | |
| 41 | +| -------------- | -------------------- | --------------------- | ----------------------- | |
| 42 | +| Standard | `4969:65501` | `4969:65502` | `4969:65503` | |
| 43 | +| Large | `4969:65501:1` | `4969:65502:2` | `4969:65503:3` | |
| 44 | + |
| 45 | +### AS-Prepending to Selective Peers |
| 46 | + |
| 47 | +| Community type | Prepend ASN one time | Prepend ASN two times | Prepend ASN three times | |
| 48 | +| -------------- | -------------------- | --------------------- | ----------------------- | |
| 49 | +| Standard | `65501:$peer` | `65502:$peer` | `65503:$peer` | |
| 50 | +| Large | `4969:65501:$peer` | `4969:65502:$peer` | `4969:65503:$peer` | |
| 51 | + |
| 52 | +Where `$peer` represents the ASN of the target peer. |
| 53 | + |
| 54 | +## Route Server Opt-Out |
| 55 | + |
| 56 | +If a participant does not wish to peer with specific other networks via the route server, they can use the BGP community controls documented above to instruct the route server accordingly. Alternatively, they may choose not to use the route server at all and only establish direct sessions with selected peers. Using the exchange does not force any participant to peer with everyone; it simply provides the opportunity. |
9 | 57 |
|
10 | 58 | All participants must respect that others may have restrictive policies and are not obligated to accept a peering session. Conversely, participants with restrictive policies should handle their filtering on their side (or via route server communities) and not pressure OpenIX to remove any particular participant from the exchange. |
11 | 59 |
|
12 | | -OpenIX is open to all qualified networks and will not bar participants just because some networks don’t wish to peer with them (except in cases of policy violation or legal issues as described elsewhere). |
| 60 | +OpenIX is open to all qualified networks and will not bar participants just because some networks don't wish to peer with them (except in cases of policy violation or legal issues as described elsewhere). |
| 61 | + |
| 62 | +## Additional Information |
| 63 | + |
| 64 | +### How Route Servers Work |
| 65 | + |
| 66 | +Route servers facilitate multilateral peering by acting as a central point for route distribution. When you peer with a route server: |
| 67 | + |
| 68 | +1. **No Traffic Forwarding**: Route servers only exchange routing information (BGP routes). They do not forward any data traffic. All traffic flows directly between participants' routers. |
| 69 | + |
| 70 | +2. **Next-Hop Preservation**: The original BGP next-hop is preserved in route announcements. This ensures traffic flows directly between peers, not through the route server. |
| 71 | + |
| 72 | +3. **Transparent AS Path**: The route server's ASN (4969) is not added to the AS_PATH, maintaining transparency in routing. |
| 73 | + |
| 74 | +### Route Filtering |
| 75 | + |
| 76 | +OpenIX route servers implement multiple layers of filtering to ensure routing security: |
| 77 | + |
| 78 | +- **IRR-based Filtering**: Routes are validated against Internet Routing Registry (IRR) databases |
| 79 | +- **RPKI Validation**: Route Origin Validation (ROV) using RPKI to prevent hijacking |
| 80 | +- **Prefix Length Limits**: Enforced minimum and maximum prefix lengths (typically /24 for IPv4, /48 for IPv6) |
| 81 | +- **Bogon Filtering**: Automatic rejection of bogon prefixes and invalid routes |
| 82 | +- **Max-Prefix Limits**: Per-participant prefix limits to prevent route flooding |
| 83 | + |
| 84 | +### Session Configuration |
| 85 | + |
| 86 | +To establish a BGP session with OpenIX route servers: |
| 87 | + |
| 88 | +1. Configure BGP sessions to both RS1 and RS3 IPv4 and IPv6 addresses |
| 89 | +2. Use MD5 authentication (contact NOC for the shared secret) |
| 90 | +3. Announce only prefixes registered in your IRR AS-SET |
| 91 | +4. Set appropriate max-prefix limits on your side |
| 92 | +5. Apply route server communities as needed for traffic engineering |
| 93 | + |
| 94 | +### Monitoring and Support |
| 95 | + |
| 96 | +Participants can monitor their route server sessions through: |
| 97 | + |
| 98 | +- BGP session status and statistics on their own routers |
| 99 | +- Direct contact with OpenIX NOC for troubleshooting |
| 100 | + |
| 101 | +For questions about route server configuration or to report issues, contact the OpenIX Network Operations Center (NOC). |
| 102 | + |
| 103 | +### Known Vendor Issues |
| 104 | + |
| 105 | +While OpenIX route servers are designed to work with all major router vendors and BGP implementations, participants should be aware of the following considerations: |
| 106 | + |
| 107 | +- **BGP Session Configuration**: Ensure your router supports BGP communities (both standard and large communities) for full policy control functionality |
| 108 | +- **MD5 Authentication**: Some older router firmware versions may have limitations with MD5 authentication on BGP sessions |
| 109 | +- **Route Refresh Capability**: Modern route refresh capability (RFC 2918) is recommended for optimal route server interaction |
| 110 | +- **Maximum Prefix Limits**: Configure appropriate max-prefix limits on your router to prevent session flapping |
| 111 | + |
| 112 | +If you encounter any vendor-specific issues when connecting to OpenIX route servers, please contact the NOC with details about your router model and software version so we can assist with configuration or document any known compatibility issues. |
0 commit comments