This document provides comprehensive technical instructions for connecting to FD-IX internet exchange points. FD-IX operates carrier-neutral exchange facilities across multiple locations with standardized connection procedures.
FD-IX enables direct peering between networks, reducing latency, improving reliability, and lowering transit costs. This guide covers the complete connection process from physical cross-connect to BGP configuration.
┌─────────────┐ ┌──────────────┐ ┌─────────────┐
│ Member A │────────────────────│ FD-IX │────────────────────│ Member B │
│ AS64512 │ BGP Session │ Route Server │ BGP Session │ AS64513 │
└─────────────┘ └──────────────┘ └─────────────┘
│ │ │
│ │ │
└───────────────────────────────────┴───────────────────────────────────┘
Direct Peering via Exchange Fabric
Before connecting to FD-IX, ensure you meet the following requirements:
| Requirement | Specification | Notes |
|---|---|---|
| ASN | Valid public ASN | Registered with appropriate RIR |
| IP Space | Publicly routable prefixes | Minimum /24 for IPv4, /48 for IPv6 |
| Router | BGP-capable device | Must support BGP4 and communities |
| Port Speed | 100M, 1G, 10G, or 100G | Based on traffic requirements |
| Policy | Requirement | Enforcement |
|---|---|---|
| MAC Limit | 1 MAC address per port | Automatic port shutdown on violation |
| Traffic Type | Unicast only | No broadcast/multicast allowed |
| Protocols | BGP only | No STP, CDP, or other protocols |
| ARP | Proxy ARP disabled | Required on all interfaces |
Violation of connection policies may result in automatic port shutdown. Ensure your configuration complies with all requirements before connecting to the exchange.
Follow these steps to establish your connection to FD-IX:
Fiber Type: Single-mode (9/125μm)
Connectors: LC (preferred) or SC
Distance: Typically < 100 meters within facility
Upon approval, FD-IX will assign IP addresses from the peering LAN:
| Location | IPv4 Subnet | IPv6 Subnet |
|---|---|---|
| Indianapolis | 206.53.139.0/24 | 2001:504:41:200::/64 |
| Chicago | 206.53.140.0/24 | 2001:504:41:201::/64 |
| Cleveland | 206.53.141.0/24 | 2001:504:41:202::/64 |
Configure your router interface with the assigned IP addresses:
# Cisco IOS Example
interface GigabitEthernet0/0
description FD-IX Indianapolis
ip address 206.53.139.10 255.255.255.0
ipv6 address 2001:504:41:200::10/64
no ip redirects
no ip proxy-arp
no ip directed-broadcast
no cdp enable
no lldp transmit
no lldp receive
mtu 9000
no shutdown
# Juniper JunOS Example
set interfaces ge-0/0/0 description "FD-IX Indianapolis"
set interfaces ge-0/0/0 unit 0 family inet address 206.53.139.10/24
set interfaces ge-0/0/0 unit 0 family inet6 address 2001:504:41:200::10/64
set interfaces ge-0/0/0 mtu 9000
Configure BGP sessions with FD-IX route servers for multilateral peering.
| Route Server | IPv4 Address | IPv6 Address | ASN |
|---|---|---|---|
| RS1 (Primary) | 206.53.139.1 | 2001:504:41:200::1 | 33495 |
| RS2 (Secondary) | 206.53.139.2 | 2001:504:41:200::2 | 33495 |
router bgp 64512
bgp router-id 192.0.2.1
bgp log-neighbor-changes
no bgp default ipv4-unicast
!
neighbor FD-IX-RS peer-group
neighbor FD-IX-RS remote-as 33495
neighbor FD-IX-RS ebgp-multihop 2
neighbor FD-IX-RS password 7 YOUR_MD5_PASSWORD
!
neighbor 206.53.139.1 peer-group FD-IX-RS
neighbor 206.53.139.1 description FD-IX-RS1
neighbor 206.53.139.2 peer-group FD-IX-RS
neighbor 206.53.139.2 description FD-IX-RS2
!
address-family ipv4
neighbor FD-IX-RS send-community
neighbor FD-IX-RS soft-reconfiguration inbound
neighbor FD-IX-RS route-map IX-IN in
neighbor FD-IX-RS route-map IX-OUT out
neighbor FD-IX-RS maximum-prefix 50000 90
neighbor 206.53.139.1 activate
neighbor 206.53.139.2 activate
exit-address-family
!
address-family ipv6
neighbor FD-IX-RS send-community
neighbor FD-IX-RS soft-reconfiguration inbound
neighbor FD-IX-RS route-map IX-IN-V6 in
neighbor FD-IX-RS route-map IX-OUT-V6 out
neighbor FD-IX-RS maximum-prefix 10000 90
neighbor 2001:504:41:200::1 activate
neighbor 2001:504:41:200::2 activate
exit-address-family
protocols {
bgp {
group FD-IX-RS {
type external;
multihop ttl 2;
local-address 206.53.139.10;
family inet {
unicast {
prefix-limit {
maximum 50000;
teardown 90;
}
}
}
family inet6 {
unicast {
prefix-limit {
maximum 10000;
teardown 90;
}
}
}
authentication-key "YOUR_MD5_PASSWORD";
export IX-OUT;
import IX-IN;
peer-as 33495;
neighbor 206.53.139.1 {
description "FD-IX-RS1";
}
neighbor 206.53.139.2 {
description "FD-IX-RS2";
}
}
}
}router bgp 64512
router-id 192.0.2.1
maximum-paths 32
neighbor FD-IX-RS peer group
neighbor FD-IX-RS remote-as 33495
neighbor FD-IX-RS ebgp-multihop 2
neighbor FD-IX-RS password 7 YOUR_MD5_PASSWORD
neighbor FD-IX-RS send-community
neighbor FD-IX-RS maximum-routes 50000 warning-limit 45000
neighbor FD-IX-RS route-map IX-IN in
neighbor FD-IX-RS route-map IX-OUT out
neighbor 206.53.139.1 peer group FD-IX-RS
neighbor 206.53.139.1 description FD-IX-RS1
neighbor 206.53.139.2 peer group FD-IX-RS
neighbor 206.53.139.2 description FD-IX-RS2
!
address-family ipv4
neighbor FD-IX-RS activate
!
address-family ipv6
neighbor FD-IX-RS activate
neighbor 2001:504:41:200::1 peer group FD-IX-RS
neighbor 2001:504:41:200::2 peer group FD-IX-RS
Implement proper routing policies to ensure secure and efficient peering.
! IPv4 Bogon Filter
ip prefix-list BOGONS deny 0.0.0.0/8 le 32
ip prefix-list BOGONS deny 10.0.0.0/8 le 32
ip prefix-list BOGONS deny 100.64.0.0/10 le 32
ip prefix-list BOGONS deny 127.0.0.0/8 le 32
ip prefix-list BOGONS deny 169.254.0.0/16 le 32
ip prefix-list BOGONS deny 172.16.0.0/12 le 32
ip prefix-list BOGONS deny 192.0.0.0/24 le 32
ip prefix-list BOGONS deny 192.0.2.0/24 le 32
ip prefix-list BOGONS deny 192.168.0.0/16 le 32
ip prefix-list BOGONS deny 198.18.0.0/15 le 32
ip prefix-list BOGONS deny 198.51.100.0/24 le 32
ip prefix-list BOGONS deny 203.0.113.0/24 le 32
ip prefix-list BOGONS deny 224.0.0.0/3 le 32
!
! Accept legitimate prefixes
ip prefix-list IX-IN permit 0.0.0.0/0 ge 8 le 24
! Define your prefixes
ip prefix-list MY-PREFIXES permit 192.0.2.0/24
ip prefix-list MY-PREFIXES permit 198.51.100.0/24
!
! Route map for outbound announcements
route-map IX-OUT permit 10
match ip address prefix-list MY-PREFIXES
set community 64512:100
!
route-map IX-OUT deny 999
FD-IX supports standard BGP communities for traffic engineering:
| Community | Action | Description |
|---|---|---|
| 0:peer-as | Do not announce | Prevent announcement to specific peer |
| 0:33495 | Do not announce | Prevent announcement to any peer |
| 33495:peer-as | Announce only | Announce only to specific peer |
| 65535:666 | Blackhole | Blackhole traffic (DDoS mitigation) |
To prevent announcement to AS64999:set community 0:64999
To announce only to AS64999:set community 33495:64999
After configuration, verify your connection is working properly:
# Cisco
show ip bgp summary
show bgp ipv6 unicast summary
# Juniper
show bgp summary
# Arista
show ip bgp summary
show ipv6 bgp summary
Expected output should show established sessions with both route servers:
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
206.53.139.1 4 33495 123456 12345 1234567 0 0 1w2d 45678
206.53.139.2 4 33495 123457 12346 1234567 0 0 1w2d 45679
show ip bgp neighbors 206.53.139.1 routes
show ip bgp neighbors 206.53.139.1 advertised-routes
ping 206.53.139.1 source 206.53.139.10
ping 206.53.139.1 size 8972 df-bit
Monitor your IX traffic using standard tools:
show interface GigabitEthernet0/0show ip bgp neighbors 206.53.139.1 | include statistics| Issue | Possible Cause | Resolution |
|---|---|---|
| BGP session not establishing | IP configuration mismatch | Verify IP addresses and subnet masks |
| Session flapping | MTU mismatch | Set MTU to 1500 consistently |
| No routes received | Inbound policy blocking | Check route-map and prefix-list configuration |
| Routes not announced | Missing network statement | Ensure prefixes are in BGP table |
| Port disabled | Policy violation | Check for multiple MACs or broadcast traffic |
Debug commands can impact router performance. Use with caution in production environments.
# Cisco BGP debugging
debug ip bgp 206.53.139.1 updates
debug ip bgp 206.53.139.1 events
# Juniper BGP tracing
set protocols bgp group FD-IX-RS traceoptions file bgp-trace
set protocols bgp group FD-IX-RS traceoptions flag update
# Arista BGP debugging
trace bgp neighbor 206.53.139.1
If you cannot resolve the issue:
Email: support@fd-ix.com
Phone: +1 (463) 209-7100 (24/7)
Portal: https://portal.fd-ix.com