Membership Requirements
DSIX follows industry-standard peering exchange requirements. Review the checklist below before requesting a peering port.
✓ Mandatory Requirements
- ✓Valid public ASN
Registered with RIPE NCC, ARIN, APNIC, LACNIC, or AFRINIC. - ✓At least one routable prefix
Minimum /24 for IPv4 or /48 for IPv6, properly allocated by your RIR or sponsor. - ✓Up-to-date PeeringDB profile
Many members now require peers to have a valid PeeringDB entry. Keep yours current. - ✓Complete RIPE DB objects
aut-num, route/route6, and maintainer objects must be in place. Route servers filter based on IRR data. - ✓Valid abuse contact
A working abuse-c email address registered with your RIR, monitored and responsive. - ✓BGP-capable router
Hardware or software router (Cisco, Juniper, MikroTik, Bird, FRRouting, OpenBGPD, etc.) connected to the exchange. - ✓Peer with the Route Collector
All new members must peer with AS65432 (the DSIX Route Collector) for administrative monitoring.
★ Recommended Best Practices
- ★Open peering policy
Accept peering with all DSIX members by default. Selective and mandatory policies are allowed but less efficient. - ★Publish RPKI ROAs
Create Route Origin Authorizations at your RIR. Route servers prefer RPKI-valid announcements over IRR fallback. - ★Maintain an AS-SET macro
Publish as-set / as-macro with all downstream ASNs you announce. Required for IRR-based filtering. - ★MANRS compliance
Adopt the MANRS Actions: filter your announcements, prevent IP spoofing, maintain accurate contact info, publish routing data. - ★Dual-stack (IPv4 + IPv6)
Run BGP sessions on both protocols. Modern internet services benefit significantly from native IPv6. - ★Max-prefix limits
Configure max-prefix limits per peer to protect against accidental leaks. DSIX route servers enforce sensible defaults per ASN. - ★Peer with AS112
Recommended to peer with our AS112 service for anycast reverse DNS of RFC 1918 and link-local ranges.
! Port & Layer 2 Rules (Enforced)
Requirements align with MANRS, RIPE, and Euro-IX best practices. New members go through a quarantine process verifying Layer 2 compliance before being activated in the production peering fabric.
Policies & Security
DSIX enforces strict routing and Layer 2 security policies to protect the exchange fabric.
Filtering Policy
- 1 Drop small prefixes, longer than /24 (IPv4) and /48 (IPv6)
- 2 Drop all well-known martians and bogon prefixes
- 3 Ensure AS path length is between 1 and 64 ASNs
- 4 Verify peer AS matches first AS in the AS path
- 5 Drop prefixes where next-hop IP doesn't match peer IP (prevents hijacking)
- 6 Drop prefixes with transit network ASNs in the path
- 7 Verify origin AS is in the client's registered IRRDB AS-SET
- 8 RPKI Valid → Accept the prefix
- 9 RPKI Invalid → Drop the prefix
- 10 RPKI Unknown → Fall back to standard IRRDB prefix filtering
RFC1997 well-known communities (NO_EXPORT) are passed through.
Port Security
Strict limits on broadcast traffic per port. While low-level Layer 2 broadcasts (ARP) are normal, excessive broadcast traffic indicates misconfigurations, failing hardware, or firmware issues. Broadcast frames propagate across the flat peering LAN and can disrupt all members. Frames exceeding the threshold are dropped automatically.
Multicast traffic is limited per port. Small amounts (IPv6 neighbor discovery) are expected, but excessive multicast on non-multicast ports indicates configuration issues. Frames exceeding the allowed rate are dropped.
All traffic on a DSIX port must originate from a single MAC address registered in static Layer 2 ACLs. Frames from unregistered MACs are dropped. Planned maintenance changing MAC addresses must be communicated to DSIX operations in advance.
Multiple MACs usually indicate: misconfigured routers forwarding link-local traffic, Layer 2 loops between DSIX ports, leaked frames from external networks, or faulty hardware.
Frequently Asked Questions
What members ask before and after setting up their session.