Indonesia Internet eXchange Points
Network Access Point
IIX - PEERING UP

since August, 1997
Updated:
December, 1998

TECHNICAL DESIGN AND CONFIGURATION

APJII - iIX TEAM
http://www.apjii.or.id

iIX-NAP POLICY By : DESIGNED By :
Teddy A. Purwadi
mailto:sekjen@apjii.or.id

Barry Raveendran Greene
bgreene@cisco.com

Sanjaya 
mailto:teknik@apjii.or.id
Tony S. Hariman
mailto:iix-noc@apjii.or.id

APJII-iIX Engineering Team - 2nd

Johar Alam mailto:thtel97@apjii.or.id
Indra Pramana mailto:webmaster@apjii.or.id
Bill Fridini apjii-iix@apjii.or.id
Joedi Wisoeda joedi@telkom.co.id
Birowo birowo@indosat.co.id

Edited "xxx" in this document by all means to ensure the confidentiality of APJII - IIX security matters


INTRODUCTION

The Indonesian Internet eXchange (iIX) is a collaborative project sponsored by APJII. It's overall objective is the keep all intra-Indonesian Internet traffic within Indonesia. The iIX will obsolete the old method of using the US and other countries to exchange intra-Indonesian Internet traffic. iIX creates the foundation for a comprehensive national Internet infrastructure where all ISP collaborate for the common good. 

TECHNICAL OVERVIEW

The iIX interconnects three different sites to make one large IXP. The three sites are Telkom Indonesia, SatelIndo, and Indosat. ISPs can choose which site to connect based on circuit availability, upstream customer relationships, or organizational preference. 

IPv4 Address Plan

IPv4 addresses have been assigned from the IANA IXP coordinator - Bill Manning. One /24 has been assigned for the entire IXP. Hence, CIDR compliance is required for any router or switch connecting to the IXP and all ISP's equipment working with the iIX. 198.32.xxx.xxx/24 has been assigned.

The following is a break down of the assignments in the iIX (current on the data of this document) :

IP Address Block

Assignment

198.32.xxx.xxx/28 Loopback Interfaces on the routers
198.32.xxx.xxx Telkom Loopback Interface
198.32.xxx.xxx Satelindo Loopback Interface
198.32.xxx.xxx Indosat Loopback Interface
198.32.xxx.xxx/28 Point to Point Serial Links ( 4 x /30s)
198.32.xxx.xxx/30 Telkom <-> Satelindo Link
198.32.xxx.xxx/30 Telkom <-> IndoSat Link
198.32.xxx.xxx/30 Satelindo <-> IndoSat Link
198.32.xxx.xxx/27 Point to Point Serial Links ( 8 x /30s)
198.32.xxx.xxx/30 CBN.net.id Link
198.32.xxx.xxx/30 MEGA.net.id Link
198.32.xxx.xxx/26 Telkom IX Medium (ethernet)
198.32xxx.xxx iIX-Tel Router Ethernet port
198.32.xxx.xxx Indo.net.id's router ethernet port
198.32.xxx.xxx Pacific.net.id's router ethernet port
198.32.xxx.xxx Traffic Probe 
198.32.xxx.xxx Logging & Configuration Server
198.32.xxx.xxx/26 IndoSat IX Medium (ethernet)
198.32.xxx.xxx iIX-IND Router Ethernet Port
198.32.xxx.xxx Indosat's Customer Router Ethernet Port
198.32.xxx.xxx Indosat's Core Router Ethernet Port
198.32.xxx.xxx RADNet Core Router Ethernet Port
198.32.xxx.xxx UBNet Core Route Ethernet Port
198.32.xxx.xxx Traffic Probe
198.32.xxx.xxx Logging & Configuration Server
198.32.xxx.xxx/26 Satelindo IX Medium (Ethernet)
198.32.xxx.xxx iIX-SAT's router ethernet port
198.32.xxx.xxx Satelindo's router ethernet port
198.32.xxx.xxx Traffic Probe
198.32.xxx.xxx Logging & Configuration Server
End End

Autonomous Systems Number [ASN]

ASxxxx has been delegated from APNIC for the iIX. This will be used across the IXP for inter-IXP traffic (between the three sites) and with IXP members (in route reflector mode) who have not yet received their own ASN from APNIC. All IXP members are encouraged to get their own ASN.

Route Filtering via BGP

Filtering routes via BGP is necessary to enforce the IXP's peering policy and to protect the members of the IXP from unwanted routes. Two filtering techniques are used in this configuration: AS Path Filters and Distribute Lists Filters. 

AS Path Filters

AS Path Filters will be used to enforce the policy for the IXP. Only the ASNs with belong to the members of the IXP will be distributed to the IXP members. This explicit permit rule will, by default, deny ASNs which are not explicitly permitted in the AS Path Filter. This prevents routes leaking from one provider from being propagated across the IXP. For example, if provider A was connected to Internet MCI (AS3561) in the US, and for some reason Internet MCI's routes leaked through provider A, then the AS Path Filters would block AS3561 since they are not explicitly in the AS Path list. 

In addition, the AS Path filters will use a format that will only accept routes that originate from the ISP peering to the IXPs. For example, _xxxx$ will only allow routes which originate in ASxxx. Any routes that originate outside of ASxxx (for example Internet MCI) will be denied. 

Lastly, the AS Path filters will be applied on all outbound BGP peers for both the IBGP route reflector connections (for those ISPs with their ASN) and the EBGP peer connections (for those ISP with their ASN). AS Path filters will also be applied on all EBGP inbound connections. 
 
 

Distribute List Filters

Distribute List filters will be used to remove RFC 1918 (Private Address Space), multicast, and other routes that should not be propagated on the Internet routing table (i.e. like 127.xxx.xxx.xxx/16). This safe guard keeps networks link 10.xxx.xxx.xxx/8 from getting leaked out across the Internet. 
 
 

IP Filtering

IP filtering is an additional policy enforcement tool. Essentially, you place a egress and ingress ip packet filter on the peer connections connecting to the IXP. Every packet coming into or out of the IXP will get checked. Some filters are designed to insure that all packets that leave a ISP belong to that ISP. This called ingress filtering. Other filters check packets coming into a ISP are not "rouge," private, or spoofed addresses. This is called egress filtering. ISPs who connect to an IXP are encouraged to do both. 
 

Connecting to the IXP
 

iIX will have several types of ISPs connecting to the IXP fabric. Some ISPs will have their own Autonomous System Numbers (ASNs) and will peer directly to the IXP. Other ISPs will peer directly, but have yet obtained a ANS. These will connect via BGP route reflectors within the iIX's own ASN. Still others will connect through the commercial Layer 3 IXPs of Indosat and Satelindo. All of these ISPs will have to integrate BGP into their internal network routing topology. This section's goal is to highlight some of the design and integration options available to the ISP connecting to the iIX. 
 

ISPs with no ASN
 

Some ISPs will not have their own ASN. The are connected to the Internet via a lease line to a Network Service Provider (NSP) in the US. Their internal routing could be built with static routes, OSPF, IS-IS, EIGRP, or RIPv2. What follows is one example of a way a ISP can configure their routing protocols. 
 

BGP to OSPF to BGP
 

ISPs who are already using BGP to connect to the Internet should not have any problem connecting to iIX. Due consideration must be paid to the filters used. ISPs should insure that iIX routes are not leaked to the rest of the Internet and routes from the Internet are not leaked into iIX. Figure 5 is a diagram of an ISP (AS 100) with connections to two upstream NSPs (AS 200 & AS 300). EBGP is used to advertise the ISP's route objects to iIX, NSP2 and NSP3. The full Internet routing table is pulled from the two NSPs. 
 

Proactive filtering is a must in this situation. Config Example 3 is one example of BGP filtering that would satisfy the requirements the filtering requirements. Note that the as-path access-list 3 filters routes that originate in AS 100. This is to prevent routes advertised out one NSP from coming back through the other NSP. 
 

Other filter rules will also work. Refer to the documentation on BGP Regular Expression filters. 
 
 
 
 

iIX Detailed Diagram: Phase-1


 
 


mailto:webmaster@apjii.or.id