Version 1.00, 2016-05-12, ECIX, Peering GmbH.
Based on the configuration guide version 1.33, 2012-08-13, AMS-IX B.V.
This article provides a number of pointers towards setting up your device when connecting to ECIX. ECIX rules restrict the type of traffic and number of source MAC addresses that any member may to send to the exchange.
The article describes how to configure your interface towards ECIX in way that exclusively enables allowed traffic to be sent towards the exchange.
The European Commercial Internet Exchange (ECIX) operates as a shared Layer 2 (L2) Ethernet infrastructure. Large Ethernet LANs require that more or less everyone plays by the same set of rules. In other words, it can be quite sensitive to misbehavior.
In order to improve the stability of the Exchange, ECIX has defined a set of rules to which every member's connection must adhere, the Technical Specifications.
Not everybody immediately grasps the subtleties of configuring equipment to adhere to the rules, so this document tries to fill in some blanks and provide examples and hints for the most common equipment.
Definition of Terms
In this document we refer to terms such as 'L2 device', 'L2/L3 hybrid', etc. It may be worthwhile to explain what we mean by them here.
A device that functions as a Layer 2 (Ethernet) Bridge (a.k.a.‚ 'switch', 'bridge', etc).
A device that functions as a L3 (IP) router only. This means it does not bridge any Ethernet frames between its interfaces. Such a device is typically called a "router".
A device that functions both as a L2 bridge and a L3 router. This means it can both bridge Ethernet frames between its interfaces as well as route IP traffic and participate in IP routing protocols. Foundry/Brocade, Force10 and Extreme are common examples of this type of device.