Technical Documentation Version 1.0 Last Updated: Aug 2025

FD-IX Connection Guide

BGP Configuration and Route Server Setup Documentation

1. Overview

This document provides comprehensive technical instructions for connecting to FD-IX internet exchange points. FD-IX operates carrier-neutral exchange facilities across multiple locations with standardized connection procedures.

Purpose

FD-IX enables direct peering between networks, reducing latency, improving reliability, and lowering transit costs. This guide covers the complete connection process from physical cross-connect to BGP configuration.

1.1 Key Benefits

  • Direct Peering: Exchange traffic directly with hundreds of networks
  • Reduced Latency: Eliminate unnecessary network hops
  • Cost Savings: Reduce transit bandwidth requirements
  • Improved Reliability: Multiple peering paths for redundancy
  • 24/7 Support: Round-the-clock NOC monitoring and support

1.2 Network Architecture

┌─────────────┐                    ┌──────────────┐                    ┌─────────────┐
│  Member A   │────────────────────│   FD-IX      │────────────────────│  Member B   │
│  AS64512    │    BGP Session     │ Route Server │    BGP Session     │  AS64513    │
└─────────────┘                    └──────────────┘                    └─────────────┘
       │                                   │                                   │
       │                                   │                                   │
       └───────────────────────────────────┴───────────────────────────────────┘
                              Direct Peering via Exchange Fabric
              

2. Prerequisites

Before connecting to FD-IX, ensure you meet the following requirements:

2.1 Technical Requirements

Requirement Specification Notes
ASN Valid public ASN Registered with appropriate RIR
IP Space Publicly routable prefixes Minimum /24 for IPv4, /48 for IPv6
Router BGP-capable device Must support BGP4 and communities
Port Speed 100M, 1G, 10G, or 100G Based on traffic requirements

2.2 Policy Requirements

Policy Requirement Enforcement
MAC Limit 1 MAC address per port Automatic port shutdown on violation
Traffic Type Unicast only No broadcast/multicast allowed
Protocols BGP only No STP, CDP, or other protocols
ARP Proxy ARP disabled Required on all interfaces

Important

Violation of connection policies may result in automatic port shutdown. Ensure your configuration complies with all requirements before connecting to the exchange.

3. Connection Process

Follow these steps to establish your connection to FD-IX:

3.1 Order Cross-Connect

  1. Contact your data center provider to order a cross-connect to FD-IX
  2. Specify the FD-IX meet-me room (MMR) location for your facility
  3. Choose your port speed: 100Mbps, 1Gbps, 10Gbps, or 100Gbps
  4. Request single-mode fiber (SMF) with LC or SC connectors

Cross-Connect Specifications

Fiber Type: Single-mode (9/125μm)
Connectors: LC (preferred) or SC
Distance: Typically < 100 meters within facility

3.2 IP Assignment

Upon approval, FD-IX will assign IP addresses from the peering LAN:

Location IPv4 Subnet IPv6 Subnet
Indianapolis 206.53.139.0/24 2001:504:41:200::/64
Chicago 206.53.140.0/24 2001:504:41:201::/64
Cleveland 206.53.141.0/24 2001:504:41:202::/64

3.3 Interface Configuration

Configure your router interface with the assigned IP addresses:

# Cisco IOS Example
interface GigabitEthernet0/0
 description FD-IX Indianapolis
 ip address 206.53.139.10 255.255.255.0
 ipv6 address 2001:504:41:200::10/64
 no ip redirects
 no ip proxy-arp
 no ip directed-broadcast
 no cdp enable
 no lldp transmit
 no lldp receive
 mtu 9000
 no shutdown
              
# Juniper JunOS Example
set interfaces ge-0/0/0 description "FD-IX Indianapolis"
set interfaces ge-0/0/0 unit 0 family inet address 206.53.139.10/24
set interfaces ge-0/0/0 unit 0 family inet6 address 2001:504:41:200::10/64
set interfaces ge-0/0/0 mtu 9000
              

4. BGP Configuration

Configure BGP sessions with FD-IX route servers for multilateral peering.

4.1 Route Server Details

Route Server IPv4 Address IPv6 Address ASN
RS1 (Primary) 206.53.139.1 2001:504:41:200::1 33495
RS2 (Secondary) 206.53.139.2 2001:504:41:200::2 33495

4.2 Cisco Configuration

router bgp 64512
 bgp router-id 192.0.2.1
 bgp log-neighbor-changes
 no bgp default ipv4-unicast
 !
 neighbor FD-IX-RS peer-group
 neighbor FD-IX-RS remote-as 33495
 neighbor FD-IX-RS ebgp-multihop 2
 neighbor FD-IX-RS password 7 YOUR_MD5_PASSWORD
 !
 neighbor 206.53.139.1 peer-group FD-IX-RS
 neighbor 206.53.139.1 description FD-IX-RS1
 neighbor 206.53.139.2 peer-group FD-IX-RS
 neighbor 206.53.139.2 description FD-IX-RS2
 !
 address-family ipv4
  neighbor FD-IX-RS send-community
  neighbor FD-IX-RS soft-reconfiguration inbound
  neighbor FD-IX-RS route-map IX-IN in
  neighbor FD-IX-RS route-map IX-OUT out
  neighbor FD-IX-RS maximum-prefix 50000 90
  neighbor 206.53.139.1 activate
  neighbor 206.53.139.2 activate
 exit-address-family
 !
 address-family ipv6
  neighbor FD-IX-RS send-community
  neighbor FD-IX-RS soft-reconfiguration inbound
  neighbor FD-IX-RS route-map IX-IN-V6 in
  neighbor FD-IX-RS route-map IX-OUT-V6 out
  neighbor FD-IX-RS maximum-prefix 10000 90
  neighbor 2001:504:41:200::1 activate
  neighbor 2001:504:41:200::2 activate
 exit-address-family
              

4.3 Juniper Configuration

protocols {
    bgp {
        group FD-IX-RS {
            type external;
            multihop ttl 2;
            local-address 206.53.139.10;
            family inet {
                unicast {
                    prefix-limit {
                        maximum 50000;
                        teardown 90;
                    }
                }
            }
            family inet6 {
                unicast {
                    prefix-limit {
                        maximum 10000;
                        teardown 90;
                    }
                }
            }
            authentication-key "YOUR_MD5_PASSWORD";
            export IX-OUT;
            import IX-IN;
            peer-as 33495;
            neighbor 206.53.139.1 {
                description "FD-IX-RS1";
            }
            neighbor 206.53.139.2 {
                description "FD-IX-RS2";
            }
        }
    }
}

4.3 Arista Configuration

router bgp 64512
   router-id 192.0.2.1
   maximum-paths 32
   neighbor FD-IX-RS peer group
   neighbor FD-IX-RS remote-as 33495
   neighbor FD-IX-RS ebgp-multihop 2
   neighbor FD-IX-RS password 7 YOUR_MD5_PASSWORD
   neighbor FD-IX-RS send-community
   neighbor FD-IX-RS maximum-routes 50000 warning-limit 45000
   neighbor FD-IX-RS route-map IX-IN in
   neighbor FD-IX-RS route-map IX-OUT out
   neighbor 206.53.139.1 peer group FD-IX-RS
   neighbor 206.53.139.1 description FD-IX-RS1
   neighbor 206.53.139.2 peer group FD-IX-RS
   neighbor 206.53.139.2 description FD-IX-RS2
   !
   address-family ipv4
      neighbor FD-IX-RS activate
   !
   address-family ipv6
      neighbor FD-IX-RS activate
      neighbor 2001:504:41:200::1 peer group FD-IX-RS
      neighbor 2001:504:41:200::2 peer group FD-IX-RS
              

5. Routing Policies

Implement proper routing policies to ensure secure and efficient peering.

5.1 Prefix Filtering

Inbound Filtering (Bogon List)

! IPv4 Bogon Filter
ip prefix-list BOGONS deny 0.0.0.0/8 le 32
ip prefix-list BOGONS deny 10.0.0.0/8 le 32
ip prefix-list BOGONS deny 100.64.0.0/10 le 32
ip prefix-list BOGONS deny 127.0.0.0/8 le 32
ip prefix-list BOGONS deny 169.254.0.0/16 le 32
ip prefix-list BOGONS deny 172.16.0.0/12 le 32
ip prefix-list BOGONS deny 192.0.0.0/24 le 32
ip prefix-list BOGONS deny 192.0.2.0/24 le 32
ip prefix-list BOGONS deny 192.168.0.0/16 le 32
ip prefix-list BOGONS deny 198.18.0.0/15 le 32
ip prefix-list BOGONS deny 198.51.100.0/24 le 32
ip prefix-list BOGONS deny 203.0.113.0/24 le 32
ip prefix-list BOGONS deny 224.0.0.0/3 le 32
!
! Accept legitimate prefixes
ip prefix-list IX-IN permit 0.0.0.0/0 ge 8 le 24
              

Outbound Filtering

! Define your prefixes
ip prefix-list MY-PREFIXES permit 192.0.2.0/24
ip prefix-list MY-PREFIXES permit 198.51.100.0/24
!
! Route map for outbound announcements
route-map IX-OUT permit 10
 match ip address prefix-list MY-PREFIXES
 set community 64512:100
!
route-map IX-OUT deny 999
              

5.2 BGP Communities

FD-IX supports standard BGP communities for traffic engineering:

Community Action Description
0:peer-as Do not announce Prevent announcement to specific peer
0:33495 Do not announce Prevent announcement to any peer
33495:peer-as Announce only Announce only to specific peer
65535:666 Blackhole Blackhole traffic (DDoS mitigation)

Community Usage Example

To prevent announcement to AS64999:
set community 0:64999

To announce only to AS64999:
set community 33495:64999

6. Verification and Testing

After configuration, verify your connection is working properly:

6.1 BGP Session Status

# Cisco
show ip bgp summary
show bgp ipv6 unicast summary

# Juniper
show bgp summary

# Arista
show ip bgp summary
show ipv6 bgp summary
              

Expected output should show established sessions with both route servers:

Neighbor        V    AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
206.53.139.1    4 33495  123456   12345  1234567    0    0 1w2d        45678
206.53.139.2    4 33495  123457   12346  1234567    0    0 1w2d        45679
              

6.2 Route Verification

  1. Check routes received from route servers:
    show ip bgp neighbors 206.53.139.1 routes
  2. Verify your announcements:
    show ip bgp neighbors 206.53.139.1 advertised-routes
  3. Test connectivity to route servers:
    ping 206.53.139.1 source 206.53.139.10
  4. Verify MTU path:
    ping 206.53.139.1 size 8972 df-bit

6.3 Traffic Monitoring

Monitor your IX traffic using standard tools:

  • Interface statistics: show interface GigabitEthernet0/0
  • BGP statistics: show ip bgp neighbors 206.53.139.1 | include statistics
  • NetFlow/sFlow: Configure flow export for detailed traffic analysis
  • SNMP: Monitor via standard IF-MIB counters

7. Troubleshooting

7.1 Common Issues

Issue Possible Cause Resolution
BGP session not establishing IP configuration mismatch Verify IP addresses and subnet masks
Session flapping MTU mismatch Set MTU to 1500 consistently
No routes received Inbound policy blocking Check route-map and prefix-list configuration
Routes not announced Missing network statement Ensure prefixes are in BGP table
Port disabled Policy violation Check for multiple MACs or broadcast traffic

7.2 Debug Commands

Caution

Debug commands can impact router performance. Use with caution in production environments.

# Cisco BGP debugging
debug ip bgp 206.53.139.1 updates
debug ip bgp 206.53.139.1 events

# Juniper BGP tracing
set protocols bgp group FD-IX-RS traceoptions file bgp-trace
set protocols bgp group FD-IX-RS traceoptions flag update

# Arista BGP debugging
trace bgp neighbor 206.53.139.1
              

7.3 Escalation Process

If you cannot resolve the issue:

  1. Collect diagnostic information:
    • BGP configuration
    • Interface statistics
    • Error messages
    • Packet captures if applicable
  2. Check FD-IX member portal for service status
  3. Contact FD-IX with collected information

FD-IX Contact

Email: [email protected]

Phone: +1 (463) 209-7100 (24/7)

Portal: https://portal.fd-ix.com

8. Appendix

8.1 Reference Links

8.2 Glossary

ASN
Autonomous System Number - A unique identifier for networks on the Internet
BGP
Border Gateway Protocol - The routing protocol used between autonomous systems
IX
Internet Exchange - A physical infrastructure for networks to exchange traffic
MMR
Meet-Me Room - The physical location where cross-connects are terminated
MTU
Maximum Transmission Unit - The largest packet size that can be transmitted
RIR
Regional Internet Registry - Organizations that manage IP address allocation
Route Server
A BGP speaker that facilitates multilateral peering at an IX