Policy
AS213151 practices an open peering policy which means that we peer with everyone who wants to peer with us. While we do not require any kind of written contract, you must follow these rules:
- Peers may only send traffic from their own and downstream networks to us.
- Peers may only send traffic to destinations announced by AS213151.
- Peers must not configure static or default routes to our routers.
- Peers must operate a Network Operations Center (NOC) reachable by email.
- Peers must keep their IRR and registry data up to date at any time.
- Peers shall enforce a strict routing policy to avoid route leaks.
- Peers shall aggregate their routes to avoid routing table inflation.
- Peers should cooperate in any case of abuse.
Interfaces
Peerings are possible at the following points of presence:
Costs
Peering with AS213151 is cost-neutral for both parties.
Routing & Filtering
Please note the following preferences and technical information before entering a peering with us:
- Prefixes are filtered against IRR (RIPE, APNIC, RADB, etc.) and RPKI.
- Prefixes shorter than a /24 (IPv4) or /48 (IPv6) will be filtered.
- Prefixes with private or other invalid ASNs in AS_PATH will be filtered.
- Prefixes with private address space (RFC1918, RFC4193) will be filtered.
- Prefixes pointing to well-known bogon addresses will be filtered.
- Prefixes with invalid NEXT_HOP attribute will be filtered.
- We strongly encourage MD5 authentication for additional security.
- We support usage of the GRACEFUL_SHUTDOWN community (RFC8326).
- We support usage of Bidirectional Forwarding Detection (BFD) (RFC5880).
- At peering exchanges, peering over route server is encouraged.
- We configure an individual prefix limit for all peering sessions, based on PeeringDB data.
Mutually Agreed Norms for Routing Security (MANRS)
In our efforts to improve Internet routing security, we have joined MANRS, which is a global initiative, supported by the Internet Society, that provides essential fixes to reduce the most common routing threats.
As part of our membership with MANRS, AS213151 commits to adhere to four concrete actions to reduce routing threats:
- Filtering
- Anti-Spoofing
- Coordination
- Global Validation
Resource Public Key Infrastructure (RPKI)
RPKI is a method to help prevent BGP hijacking and Route Leaks. It uses cryptographic signatures to validate that an ASN is allowed to announce a particular Prefix.
AS213151 has deployed RPKI Route Validation and Filtering. We reject RPKI Invalids on all BGP Sessions.
RPKI State | Description | Policy |
---|---|---|
Valid | Correct IP/masklength from the correct origin AS according to the ROA. | Accept |
Unknown | No ROA registered. | Accept |
Invalid | Incorrect masklength and/or origin AS according to the registered ROA. | Reject |
AS213151 also maintains valid Route Origination Authorizations (ROA) for all originated prefixes.
Prefixes
AS213151 originates the following prefixes:
Communities
Description | Large Community |
---|---|
Info: Origin Route | |
Originated by AS213151 | 213151:100:1 |
Info: Transit Route | |
Hurricane Electric | 213151:200:6939 |
Meerfarbig | 213151:200:34549 |
iFog | 213151:200:34927 |
FreeTransit (Openfactory) | 213151:200:41051 |
Info: IXP Route | |
DE-CIX Frankfurt | 213151:300:6695 |
KleyReX | 213151:300:31142 |
LocIX Frankfurt | 213151:300:202409 |
Info: Peering Route | |
DFN | 213151:400:680 |
Apple | 213151:400:714 |
Hurricane Electric | 213151:400:6939 |
Etisalat | 213151:400:8966 |
GlobalConnect | 213151:400:12552 |
Cloudflare | 213151:400:13335 |
Amazon.com | 213151:400:16509 |
ISC F-Root FRA1 | 213151:400:33082 |
iFog | 213151:400:34927 |
TKRZ Stadtwerke | 213151:400:42184 |
Alibaba Group | 213151:400:45102 |
JMP Technology Services | 213151:400:61423 |
Info: Downstream Route | |
RouteViews | 213151:500:6447 |
RIPE RIS | 213151:500:12654 |
SLA
No explicit SLA is guaranteed. This network operates on a best-effort basis.
Want to peer?
Great! Send a mail to peering@as213151.net. Include your ASN, your prefix limit count and your preferred peering location.