Route servers
LINX maintains route servers at each of the Peering LANs allowing members to establish multilateral peering with other participants.
Connect to the route servers
The Route Servers use the BIRD and OpenBGPd distributions with the Ubuntu Server Linux distribution.
Technical Details are as follows:
AS Number: 8714
All route servers filter bogon address ranges.
Policy control
Policy control is done by use of BGP Standard Communities and BGP Large Communities. Members may tag their routes with the following to control policy via the route server.
The model is as follows:
If none of the above communities is present then the default behaviour is to advertise the prefix to all peers.
AS-Path prepending
Members can now manipulate the BGP AS_Path attribute through prepending multiple entries of an AS for prefixes they announce to the LINX Route-Servers. Members can action AS_Path prepending to deprioritize a route for an alternate path by tagging a specified community to their prefix or prefixes.
Members can either action AS-Path prepending to all members or to selective members.
The tables below show the standard and large communities to perform AS-Path prepending actions.
The table below shows the communities required to be tagged to announce prefixes with AS-prepending actioned to all members peering on the route-servers.
The table below shows the communities required to be tagged to announced prefixes with AS-prepending actioned to selective members peering on the route-servers.
The maximum number of AS-Path prepends allowed is three times. If members wish to have this increased, please contact [email protected]
Prefix validation
LINX is validating prefixes at ingress on all route servers. The validation is based on RPKI and IRR Object presence.
For RPKI validation we build a ROA table from IRR trust anchors and for IRR Object presence we build a list of valid origin ASN and prefixes based on route objects. Refines/more specifics of valid route objects are rejected.
We are looking for a valid AS-SET in the members PeeringDB record. If no valid AS-SET is found, we use the members ASN only, unless the member has provided us other information.
The results of the validation is reflected in communities which are being added at ingress:
8714:65011 = Prefix is present in an AS's announced AS/AS-SET
8714:65021 = Prefix is not present in an AS's announced AS/AS-SET
8714:65010 = Prefix has valid Origin AS in AS-SET
8714:65020 = Prefix has no valid Origin AS in AS-SET
8714:65012 = Prefix is RPKI VALID
8714:65022 = Prefix is RPKI INVALID
8714:65023 = Prefix is RPKI UNKNOWN
The prefix validation will always occur, and members can check the communities being set to their prefixes, and as such see the result of the validation checks through the route server looking glass interface.
Prefixes will only be accepted on the following criteria where,
Prefixes tagged with communities 8714:65010 (valid Origin AS in AS-SET) & 8714:65012 (RPKI VALID) or
Prefixes tagged with communities 8714:65010 (valid Origin AS in AS-SET) & 8714:65011(Prefix is present in an AS's announced AS/AS-SET) & 8714:65023 (RPKI UNKNOWN).
All other prefixes will be filtered at egress.
Any member who prefers to receive an unfiltered set of prefixes can request to opt-out of the filtering by contact our NOC at [email protected].
Basic Remote-Triggered-Blackholing (RTBH) via the route servers
If you want to blackhole a certain IPv4 or IPv6 prefix by using the LINX route servers, then please the BLACKHOLE BGP Community (65535:666).
Please do not set the NO-EXPORT or NO-ADVERTISE community on your BGP announcement with the BLACKHOLE BGP Community as this tells the LINX route servers not to re-distribute this announcement. The route servers will add the NO_EXPORT community.
Looking glass
Looking Glass for route-servers is now accessible.
Vendor Issues
Corrupt AS path & malformed AS-Path issues
Some members who use Cisco, Brocade and Huawei devices to peer with may encounter issues in establishing peering sessions and may see notifications of invalid or corrupt AS path and Malformed AS-path in their device logs. Something similar to:
Sep 1 08:40:40.498 UTC: %BGP-5-ADJCHANGE: neighbor 195.66.225.230 Up
Sep 1 08:40:41.506 UTC: %BGP-5-ADJCHANGE: neighbor 195.66.225.230 Down BGP Notification sent
Sep 1 08:40:41.506 UTC: %BGP-3-NOTIFICATION: sent to neighbor 195.66.225.230 3/11 (invalid corrupt AS path) 11 bytes 40020802 033C3424 580097
This issue is caused where the peering device does not like to receive updates from the route-server where the first AS in the path is not the route-server AS.
To work around this please use one of the vendor specific commands in your router configuration.
Cisco/Quagga/Brocade/Arista
router bgp <ASN>
no bgp enforce-first-as
Huawei
bgp <ASN>
undo check-first-as
If members are having trouble peering with the route servers please contact support.
For more information on Route Server statistics, please look at Route Server Graphs
Route server peers at LINX
NB: This page only lists established sessions