Technical Requirements
Technical requirements to ask from members
An IXP is a delicate environment. It is where several ISPs, of different cultures and backgrounds, meet. It is a common ground, useful to all members. Like in all common areas, there must be rules that all should observe to ensure that the IXP runs smoothly, for the benefit of all.
Mandatory requirements
Any ISP wishing to participate to an Internet Exchange must have been assigned by a Regional Internet Registry (RIR) or a Local Internet Registry (LIR): an Autonomous System number, and a set of IP subnets. Without those elements, an ISP would not be able to run BGP on its routers, and therefore establish BGP peerings with other members of the IXP.
Requirements for the better functioning of the peering LAN
The purpose of the peering LAN of an IXP is to let ISPs exchange IP traffic between their Autonomous Systems (and those of their customers). The only function that routers connected to the IXP (or at least the interfaces connected to the IXP) should accomplish is to establish BGP peerings and to forward IP traffic.
Features that do not perform BGP-related functions which are active on ISP routers might be not only useless, but potentially dangerous to the operations of the IXP. In particular, an ISP router should only send the following ethertypes on the peering LAN: IPv4, IPv6 (assuming IPv6 is supported by the IXP) and ARP.
The ISP routers should not run on the interfaces connected to the IXP the following protocols:
-
Spanning Tree 802.1D. A misconfiguration of the spanning tree protocol might include the peering switch in the spanning tree, and make it "part" of the ISP network.
-
Proxy ARP RFC1027. A router configured with Proxy ARP answers to all ARP queries passing through the network. This is dangerous, as it could lead to hijacking packets destined to other ISPs. Please note that on some routers Proxy ARP is on by default, so it may have to be proactively shut down.
-
Discovery protocols (ex. CDP, LLDP). These are also considered internal management protocols and should stop at management boundaries.