InterLAN Internet Exchange, the largest neutral IXP in Romania for data traffic and internet exchange consistently reached in the recent months an aggregate traffic peak of over 150 Gbps.
As a result of traffic growth in Frankfurt, the interconnection capacity was increased to 100 Gbps.
InterLAN brings together and serves more than 100 operators: internet access service providers, content providers, internet domain name service providers, educational networks, banking and financial companies, social media platforms, public institutions. InterLAN hosts 5 out of 13 DNS root name servers: D-Root (University of Maryland), E-Root (NASA AMES Research Center), F-Root (Internet Systems Consortium) Root (operated by Verisign), K-Root (operated by RIPE NCC) and L-Root (operated by ICANN).
Currently, InterLAN Internet Exchange platform has 135 connected ports with an aggregate capacity of nearly 800 Gbps.
Blizzard Entertainment becomes a traffic partner in InterLAN Internet Exchange. Blizzard Entertainment is a premier developer and publisher of entertainment software. The company became one of the most popular and well-respected makers of computer games. By focusing on creating well-designed, highly enjoyable entertainment experiences, Blizzard Entertainment has maintained an unparalleled reputation for quality since its inception.
TVSAT Media Group becomes a traffic partner in InterLAN Internet Exchange.
Asociatia Interlan together with ANISP, organized a press conference related with NETCITY Project in Bucharest.
The talks and debates were conducted by both president of the associations, Eric Andrei Baleanu (Asociatia Interlan) and Catalin Cuturelea (ANISP) along with other representatives of telecom industry: Dan Georgescu (Counselor of the Minister of Communications and President of AOTR – Association of Telecommunications Operators in Romania), Mihai Constantin (AOMR – Association of Mobile Operators in Romania), Marian Bumbar (General Counselor, Member of the Public Utilities Committee), Tiberiu Gîndu (ANISP, Executive Director) as well as other representatives of network operators.
During the conference, the representatives of the operators complained that the failure to comply with the legal conditions regarding the implementation of the ANCOM Opinion issued in 2013 for the metropolitan Netcity network and the carelessness of the national regulator of telecommunications (ANCOM), which faild to issue a decision in this respect two years ago, lead to the extinction of the small and medium-sized operators on the market and, implicitly, the disappearence of competition with direct negative effects on end-users.
Eric Andrei Băleanu stated that 10 years ago Romania was placed first in Europe and on third place in the world at Internet connection speeds, and in the present days we are currently out of the top 10. Nicolae Căpuşeanu (Dynamic Distribution) and Adrian Calineata (Pronet Soluții IT) pointed out the problems faced by small operators in relation to Netcity, and how this non-compliant project threatens their bankruptcy business.
More details you can find here:
Valve Corporation becomes a traffic partner in InterLAN Internet Exchange. Valve is a developer of leading-edge technologies, a leading platform for digital content offering thousands of games to millions of users around the world. Valve’s portfolio includes titles in the award-winning Counter-Strike, Day of Defeat, Team Fortress, Left 4 Dead, Portal and Dota franchises.
1. Traffic Participants are encouraged to announce all their routes and accept all routes from InterLAN. For a better and easier connectivity it is recommended that participants perform BGP sessions with InterLAN route-servers. Participants in peering are advised to establish a page on their own website (e.g. website.com/peering), where the peering access procedure is detailed for whoever may be interested.
2. It is recommended that the devices used for interconnection be specialized equipment such as routers or Layer III class switches.
1. The traffic that runs through the InterLAN infrastructure as a result of the exchange of information between participants should not be filtered or altered. The interception or the examination of this traffic will be made with the written approval of InterLAN technical department or at the written request of qualified authorities, according to the law in force.
2. Potential participants are entirely responsible in terms of connectivity with InterLAN POP where the interconnection will take place.
3. InterLAN alone will decide the route to transfer data packets from the partner in the InterLAN network.
4. Traffic participants will not act send illegal traffic or other traffic that hinders InterLAN peering use by other partners (e.g. ARP spoofing, sniffers installation, etc.).
5. Ethernet packets sent to the access ports in InterLAN by the partners will have only the following types:
a. 0x0800 – IPv4
b. 0x0806 – ARP
c. 0x86dd – Ipv6
d. 0x8100 – 802.1q
6. It is forbidden to activate Proxy ARP on the interfaces towards InterLAN.
7. All Ethernet frames representing Internet Exchange traffic sent to an access port in InterLAN will have necessarily the mac address/addresses associated with IPv4 and IPv6 allocated by InterLAN technical department.
8. An IP address used for the interconnection with InterLAN RSes and with the other partners will be assigned to each peering participant. The number of IP addresses assigned to a traffic participant can be altered according to interconnection needs, supported by submitted documents.
The assignment of additional IP addresses is done by the InterLAN technical department in following situations:
a. The need for back up BGP sessions
b. Private BGP sessions operation
c. Simultaneous active sessions of the same traffic partner (identified by ASN)
9. The traffic specific to local protocols should not be sent towards the access ports in InterLAN.
10. The following type of traffic and protocols are not allowed:
a. ICMP redirect
b. IEEE802 STP
c. IRDP – (Internet router discovery protocol)
g. L2 keepalive
h. ICMPv6 ND-RA
i. Trunking protocols: VTP, DTP
j. Proprietary protocols, including but not limited to: CDP, EDP
k. Rounting protocols: OSPF, ISIS, IGRP, EIGRP, RIP
l. IGMP should not be enabled on IEX VLAN
m. xSTP should not be enabled on the port connected in InterLAN infrastructure
11. The outgoing broadcast traffic of a port should not exceed 20 pps / port / vlan.
12. MAC address numbers:
a. At client ports, only one MAC address is accepted for each IP address assigned as long as the client does not use other services than IX services. If the traffic is originated by more than one MAC address, the port will be disabled for 5 minutes.
b. More than one MAC address is accepted on the client ports depending on the services used (transit, multicast, multiple routers). The limit will be established with the customer, and if the rule is exceeded, the rule from the previous paragraph will apply. The limit may increase with the approval of InterLAN.
13. The routes exchange will be achieved only via BGP IPv4, IPv6 sessions.
14. The maximum length of a prefix announced by participants should not exceed 24-bit in the case of IPv4, and 96-bit in the case of IPv6.
15. All routes announced in InterLAN which originate from traffic participants public ASes must be registered in RIR’s database managing them (route-objects must exist).
16. Each peering participant must have a public ASN and at least one IP address class originated from his own ASN.
17. BGP sessions will announce only own IP address classes or customer’s classes and not those of other providers without their express consent along with InterLAN’s consent.
18. InterLAN’s peering reserved IP address space will be not announced in other networks except with the prior written approval of InterLAN technical department.
19. All routes announced in InterLAN will have set the nexthop to the partner making the announcement, unless the consent of technical department was obtained for the members announcing the routes with nexthop to other partners.
20. The announcement of private address classes (RFC1918) in InterLAN is not permitted.
21. A participant will send traffic to another participant’s port only in case when he has obtained permission from the latter via a route announced through InterLAN route-servers or a private BGP session.
22. The use of static routes is not allowed. All traffic routing decisions through the connection with InterLAN will be taken on the basis of by BGP session received routes.
23. Maintenance works must be notified to the InterLAN technical department at least 48 hours prior to the event, with a declared goal to take all necessary measures to prevent any compatibility and/or connectivity issues of the participants. In case of accidental equipment replacement as result of their failure, it is required to announce immediately, by any means, the InterLAN technical department.
III. BGP communities
39107:39107 – advertise to all peers
39107:ASN – advertise only to peer with ASN
0:0 – don’t advertise prefix
0:ASN – don’t advertise to peer with ASN
0: communities have precedence over 39107: communities
39107:100 – Members
39107:200 – Partners
39107:300 – Bucharest
39107:400 – Romania except Bucharest
39107:500 – International (outside Romania)
39107:600 – Content provider
39107:700 – Another IX
39107:ASN – ASN specific community – all routes are marked by this style of community
InterLAN attends „Enhanced National Cyber Security Services and Capabilities for Interoperability”, the first workshop organized by Romania National Computer Security Incident Response Team at Ramada Hotel, Constanta. The event focuses on the technical development for The National Cybersecurity Services Platform, an open running project. The project aims to ensure the interconnection of CERT-RO and other national cybersecurity capabilities and services with the EU cooperation mechanisms and core service platform, facilitating an efficient information sharing and incident management at the national and European level.
During the workshop more than 40 representatives from the public, private and academic environment will talk about issues related to launching the platform and facilitating technical discussions from the development stage so that the most appropriate solutions are implemented.
InterLAN is hosting the 7th regional RIPE SEE Meeting in Timișoara, Romania. The agenda consists of two days of tutorials, presentations and discussions about security, IPv6, BGP, routing, peering new Technologies, GDPR, data protection.
InterLAN became an authorized RoTLD partner and implemented the .ro domain management system, the application is available here https://registrar.interlan.ro.
RIPE 76 Meeting takes place between 14 and 18 May, in Marseille, France. InterLAN delegates attends RIPE 76 and participates during 5 days of presentations, tutorials, workshops and open discussions.