A Study of 28 Peering Policies
The following are snippets of Peering Policy Clauses found in the Peering Rules of the Road - A Study of 28 Peering Policies study. Clauses were categorized and put into rough categories for comparison.
The following are snippets of Peering Policy Clauses found in the Peering Rules of the Road - A Study of 28 Peering Policies study. Clauses were categorized and put into rough categories for comparison.
Peers are expected to filter their clients to reject both unauthorized BGP announcements as well as IP datagrams with invalid source addresses. – Speakeasy
Both parties shall make every reasonable effort to restrict the transmission of Denial of Service attacks and packets with forged source addresses from their network. – InterNap
# Potential peering partners must enforce strict filtering policies to prevent route leaks. – NAC
Applicant must filter route announcements from their customers by prefix. – Comcast
# Applicant must use prefix-list filters on customer links – tinet
Peers must enforce routing integrity by means of filters to their customers. – LambdaNet
# Peers are expected to filter their clients to reject both unauthorized BGP announcements, aggregate prefixes announced as well as filter their prefixes to deny IP datagrams with invalid source addresses.—OpenAccess
Must demonstrate and enforce strict filtering policies to prevent improper announcements – Charter Potential peer must demonstrate and enforce strict filtering policies to prevent improper announcements. – Cablevision
Both parties must demonstrate and enforce strict filtering policies to prevent route leaks. – WVFiber Peer must filter route announcements from its customers by prefix. – AT&T
Mr Norton is Founder of DrPeering, an Internet Peering portal and consultancy, with over twenty years of Internet experience.
From 1998-2008, Mr. Norton’s title was Co-Founder and Chief Technical Liaison for Equinix. From the beginning, Mr. Norton focused on building a critical mass of carriers, ISPs and Content Providers. To this end, he created the white paper process, identifying interesting and important Internet peering operations topics, and documenting what he learned from the peering folks. He published and presented his research white papers in a variety of international operations and research forums. These activities helped establish the relationships necessary to atract the set of Tier 1 ISPs, Tier 2 ISPs, Cable Companies, and Content Providers necessary for a healthy Internet Exchange Point ecosystem.