Skip to content

Commit d8defe6

Browse files
authored
Merge pull request #134 from pfoundation/claude/document-openix-route-servers
2 parents d6ad4df + 9eed879 commit d8defe6

File tree

3 files changed

+107
-37
lines changed

3 files changed

+107
-37
lines changed

OpenIX/04-peering/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ OpenIX offers route server service to simplify peering for participants. By peer
2222

2323
Participants can still establish direct bilateral BGP sessions with any other participant if they choose (for example, if they prefer not to use the route server for certain peers or in general). OpenIX’s route servers implement prefix filtering (using IRR and RPKI data to allow only valid, registered routes) and do not propagate routes learned from one participant to another if those routes are filtered or if the participant is not authorized to advertise them.
2424

25-
The route servers also support community controls – participants can tag routes with BGP communities to control which peers receive them (e.g., to opt-out of peering with specific ASNs or to limit route distribution). These community conventions are documentted under the Route Servers section.
25+
The route servers also support community controls – participants can tag routes with BGP communities to control which peers receive them (e.g., to opt-out of peering with specific ASNs or to limit route distribution). These community conventions are documented under the Route Servers section.
2626

2727
## Bilateral Peering
2828

OpenIX/04-peering/routeServer.md

Lines changed: 105 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,112 @@
11
---
2-
id: routeServerOptOut
3-
title: Route Server Opt-Out
2+
id: routeServer
3+
title: Route Servers
44
sidebar_position: 5
5-
description: Peering relationships through the route server, including methods to opt-out of peering with specific networks.
5+
description: Technical information about OpenIX Route Servers, including ASN, IP addresses, and BGP community controls for policy management.
66
---
77

8-
If a participant does not wish to peer with specific other networks via the route server, they can use BGP community controls to instruct the route server accordingly (as mentioned above). Alternatively, they may choose not to use the route server at all and only establish direct sessions with selected peers. Using the exchange does not force any participant to peer with everyone; it simply provides the opportunity.
8+
OpenIX provides route server infrastructure to simplify multilateral peering. By establishing BGP sessions with the route servers, participants can exchange routes with multiple peers through a single connection rather than maintaining individual bilateral sessions.
9+
10+
## Route Server ASN
11+
12+
OpenIX Route Servers operate under **ASN 4969**.
13+
14+
## Route Servers
15+
16+
### OpenIX Beirut
17+
18+
| Route Server | IPv4 | IPv6 |
19+
| ----------------- | ---------------- | ------------------------ |
20+
| OpenIX Beirut RS1 | `23.181.208.251` | `2620:98:e00e:9::4969:1` |
21+
| OpenIX Beirut RS3 | `23.181.208.253` | `2620:98:e00e:9::4969:3` |
22+
23+
Participants should establish BGP sessions with both route servers for redundancy.
24+
25+
## Policy Control
26+
27+
OpenIX Route Servers support policy control through BGP Standard Communities and BGP Large Communities. Members may tag their routes to control route announcements via the route servers.
28+
29+
### Route Announcement Control
30+
31+
| Action | Standard Community | Large Community |
32+
| ----------------------------------------------- | ------------------ | ---------------- |
33+
| Block announcement of a route to a certain peer | `0:peer-as` | `4969:0:peer-as` |
34+
| Announcement of a route to a certain peer | `4969:peer-as` | `4969:1:peer-as` |
35+
| Block announcement of a route to all peers | `0:4969` | `4969:0:0` |
36+
| Announcement of a route to all peers | `4969:4969` | `4969:1:4969` |
37+
38+
### AS-Prepending to All Peers
39+
40+
| Community type | Prepend ASN one time | Prepend ASN two times | Prepend ASN three times |
41+
| -------------- | -------------------- | --------------------- | ----------------------- |
42+
| Standard | `4969:65501` | `4969:65502` | `4969:65503` |
43+
| Large | `4969:65501:1` | `4969:65502:2` | `4969:65503:3` |
44+
45+
### AS-Prepending to Selective Peers
46+
47+
| Community type | Prepend ASN one time | Prepend ASN two times | Prepend ASN three times |
48+
| -------------- | -------------------- | --------------------- | ----------------------- |
49+
| Standard | `65501:$peer` | `65502:$peer` | `65503:$peer` |
50+
| Large | `4969:65501:$peer` | `4969:65502:$peer` | `4969:65503:$peer` |
51+
52+
Where `$peer` represents the ASN of the target peer.
53+
54+
## Route Server Opt-Out
55+
56+
If a participant does not wish to peer with specific other networks via the route server, they can use the BGP community controls documented above to instruct the route server accordingly. Alternatively, they may choose not to use the route server at all and only establish direct sessions with selected peers. Using the exchange does not force any participant to peer with everyone; it simply provides the opportunity.
957

1058
All participants must respect that others may have restrictive policies and are not obligated to accept a peering session. Conversely, participants with restrictive policies should handle their filtering on their side (or via route server communities) and not pressure OpenIX to remove any particular participant from the exchange.
1159

12-
OpenIX is open to all qualified networks and will not bar participants just because some networks don’t wish to peer with them (except in cases of policy violation or legal issues as described elsewhere).
60+
OpenIX is open to all qualified networks and will not bar participants just because some networks don't wish to peer with them (except in cases of policy violation or legal issues as described elsewhere).
61+
62+
## Additional Information
63+
64+
### How Route Servers Work
65+
66+
Route servers facilitate multilateral peering by acting as a central point for route distribution. When you peer with a route server:
67+
68+
1. **No Traffic Forwarding**: Route servers only exchange routing information (BGP routes). They do not forward any data traffic. All traffic flows directly between participants' routers.
69+
70+
2. **Next-Hop Preservation**: The original BGP next-hop is preserved in route announcements. This ensures traffic flows directly between peers, not through the route server.
71+
72+
3. **Transparent AS Path**: The route server's ASN (4969) is not added to the AS_PATH, maintaining transparency in routing.
73+
74+
### Route Filtering
75+
76+
OpenIX route servers implement multiple layers of filtering to ensure routing security:
77+
78+
- **IRR-based Filtering**: Routes are validated against Internet Routing Registry (IRR) databases
79+
- **RPKI Validation**: Route Origin Validation (ROV) using RPKI to prevent hijacking
80+
- **Prefix Length Limits**: Enforced minimum and maximum prefix lengths (typically /24 for IPv4, /48 for IPv6)
81+
- **Bogon Filtering**: Automatic rejection of bogon prefixes and invalid routes
82+
- **Max-Prefix Limits**: Per-participant prefix limits to prevent route flooding
83+
84+
### Session Configuration
85+
86+
To establish a BGP session with OpenIX route servers:
87+
88+
1. Configure BGP sessions to both RS1 and RS3 IPv4 and IPv6 addresses
89+
2. Use MD5 authentication (contact NOC for the shared secret)
90+
3. Announce only prefixes registered in your IRR AS-SET
91+
4. Set appropriate max-prefix limits on your side
92+
5. Apply route server communities as needed for traffic engineering
93+
94+
### Monitoring and Support
95+
96+
Participants can monitor their route server sessions through:
97+
98+
- BGP session status and statistics on their own routers
99+
- Direct contact with OpenIX NOC for troubleshooting
100+
101+
For questions about route server configuration or to report issues, contact the OpenIX Network Operations Center (NOC).
102+
103+
### Known Vendor Issues
104+
105+
While OpenIX route servers are designed to work with all major router vendors and BGP implementations, participants should be aware of the following considerations:
106+
107+
- **BGP Session Configuration**: Ensure your router supports BGP communities (both standard and large communities) for full policy control functionality
108+
- **MD5 Authentication**: Some older router firmware versions may have limitations with MD5 authentication on BGP sessions
109+
- **Route Refresh Capability**: Modern route refresh capability (RFC 2918) is recommended for optimal route server interaction
110+
- **Maximum Prefix Limits**: Configure appropriate max-prefix limits on your router to prevent session flapping
111+
112+
If you encounter any vendor-specific issues when connecting to OpenIX route servers, please contact the NOC with details about your router model and software version so we can assist with configuration or document any known compatibility issues.

package-lock.json

Lines changed: 1 addition & 31 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)