Important: The AMS-IX NOC reserves the right to disable ports that violate the rules below.
To ensure smooth operation of the AMS-IX infrastructure we impose a set of restrictions on what kind of traffic is allowed on the peering fabric. This page gives a summary of those restrictions. For more info, including hints on how to configure equipment, please see the AMS-IX Configuration Guide.
100base and 10base Ethernet interfaces attached to AMS-IX ports must be explicitly configured with speed, duplex other configuration settings, i.e. they should not be auto-sensing.
2.1 Ethernet framing
The AMS-IX infrastructure is based on the Ethernet II (or “DIX Ethernet”) standard. This means that LLC/SNAP encapsulation (802.2) is not permitted. For more information on the differences, see the Ethernet FAQ, question 4.1.
2.2 Ethernet types
Frames forwarded to AMS-IX ports must have one of the following ethertypes:
2.3 One MAC address per port
Frames forwarded to an individual AMS-IX port shall all have the same source MAC address.
2.4 No proxy
ARP Use of proxy ARP on the router's interface to the Exchange is not allowed.
2.5 Unicast only
Frames forwarded to AMS-IX ports shall not be addressed to a multicast or broadcast MAC destination address except as follows:
2.6 No link-local traffic
Traffic related to link-local protocols shall not be forwarded to AMS-IX ports. Link-local protocols include, but are not limited to, the following list:
The following link-local protocols are exceptions and are allowed:
3.1 No directed broadcast
IP packets addressed to AMS-IX peering LAN's directed broadcast address shall not be automatically forwarded to AMS-IX ports.
3.2 No-export of AMS-IX peering LAN
IP address space assigned to AMS-IX Peering LANs must not be advertised to other networks without explicit permission of AMS-IX.
Using Application layer protocols to unleash malicious actions against other AMS-IX customers over AMS-IX infrastructure, is forbidden. AMS-IX reserves the right to disable a customer’s port in case of complaints of attacks/abuse originating from such customers. The following list includes, but not limited to, some very well-known attacks that we forbid:
Please get in touch to file a complaint providing information about:
Typically, this information can be found in (but is not limited to) router logs, syslog servers, packet captures, BGP monitoring services.
AMS-IX will investigate to confirm the complaint and take appropriate action.