VIX Logo

Best Current Practices

In order to ensure maximum operational stability for all VIX participants, we kindly ask you to follow a few recommendations when configuring your VIX interface.

1) Filter your BGP announcements

Once you set up BGP, always filter your outgoing BGP announcements to other VIX participants. Not doing so will make your VIX connection useless and might even disturb other VIX participants.

router bgp 12345
 neighbor VIX peer-group
 neighbor VIX version 4
 neighbor VIX activate
 neighbor VIX route-map to-VIX out

route-map to-VIX permit 10
 match as-path 40
 set community 1120:1

ip as-path access-list 40 permit ^$
ip as-path access-list 40 permit ^(_23456)+$
ip as-path access-list 40 permit ^(_34567)+$

2) Aggregate your routes

Do not announce every single IP range in your network. Rather try to aggregate your routes to whole prefixes. This keeps the routing tables of your routes small.

router bgp 12345
 network mask
 network mask

3) Filter your incoming BGP announcements

BGP announcements from your VIX peers shall also be filtered on your routing device. You can do this manually by checking the announced routes from your neighbors and configuring filters statically. On the other hand, the IRR-Toolset can help you by automatically creating filters for your devices. To keep your configuration small and tidy we recommend to make use of the "maximum-prefix" option in BGP.

! maximum prefix filter for "big" neighbors
neighbor maximum-prefix 20000 80 restart 60

! prefix-list for static filtering of routes
neighbor prefix-list pl12345 in

! and the according prefix-list 
ip prefix-list pl12345 seq 5 permit
ip prefix-list pl12345 seq 10 permit

4) Announce your prefixes with BGP communities

To keep the cross-site traffic and the latency to your peers low we ask you to implement site-specific BGP communities.

5) Turn off anything but IP on your interface

It is of no use if your device speaks any other protocols than IPv4 and IPv6 on the VIX interface. So please configure your interface not to broadcast any link-local protocols (as listed in the box) except for ARP and IPv6 ND.

! don't do redirects
no ip redirects

! don't do proxy ARP
no ip proxy-arp

! don't run CDP on your VIX interface
no cdp enable

! no directed broadcasts
no ip directed-broadcast

! v6 ND-RA is unnecessary and undesired
ipv6 nd suppress-ra

! disable DEC
no mop enable

! L2 keepalives are useless on VIX
no keepalive

Please note:

All configuration examples on this page are for Cisco IOS. Other examples are welcome - please send them to noc (at)

Link-local protocols

Unwelcome link-local protocols as addressed in item 5 include, but are not limited to, the following:

  • IRDP
  • ICMP redirects
  • IEEE 802 Spanning Tree
  • Vendor proprietary protocols - these include, among others,
    • Discovery protocols: CDP, EDP, FDP
    • VLAN/trunking protocols: VTP, DTP
  • Interior routing protocol broadcasts (e.g. OSPF, ISIS, IGRP, EIGRP)
  • PIM-SM
  • PIM-DM
  • ICMPv6 ND-RA
  • UDLD
  • IP tracking
  • Layer2 keepalives