Release Notes
Getting started
DE-CIX Access
Overview and technical specifications
Create a new Access or LAG
Monitor your Access
Delete your Access
GlobePEER
DirectCLOUD
Overview and Monitoring
Cloud Connections
DirectCLOUD for Microsoft Azure
Create DirectCLOUD Connection for Azure
How to order a DirectCLOUD connection for Azure
Create or upgrade Gateways for your Azure ExpressRoute
Manage your Azure Cloud Connection
Upgrade / downgrade a DirectCLOUD service for Azure
Change DirectCLOUD configurations for Azure
Delete DirectCLOUD configurations for Azure
Monitoring Azure ExpressRoute uptime
Monitor your connection
Delete your Azure Cloud connection
FAQ DirectCLOUD for Microsoft Azure
DirectCLOUD for AWS
Create DirectCLOUD connection for AWS
Manage your DirectCLOUD connection for AWS
Upgrade / downgrade the connection
Change DirectCLOUD configurations for AWS
Delete DirectCLOUD configurations for AWS
Monitoring AWS DirectConnect uptime
Monitor your connection
Delete your AWS Cloud connection
DirectCLOUD for IBM
Create DirectCLOUD connection for IBM
Manage your DirectCLOUD connection for IBM
Upgrade / downgrade a DirectCLOUD service for IBM
Change DirectCLOUD configurations for IBM
Delete DirectCLOUD configurations for IBM
Monitor your connection
Delete your IBM Cloud connection
DirectCLOUD for GCloud
Cloud ROUTER
Overview Cloud ROUTER
Create / Manage your Cloud ROUTER
Create / Manage the configurations
VirtualPNI
Overview VirtualPNI
Create your VirtualPNI
Order and configure your VirtualPNI between two Accesses
Order and configure your VirtualPNI between Access and Cloud ROUTER
Manage your VirtualPNI
Upgrade / Downgrade your VirtualPNI service
Change VirtualPNI configurations
Delete VirtualPNI configurations
Monitor your VirtualPNI
Delete your VirtualPNI service
Colocation
API
Cloud ROUTER API
Cloud ROUTER Postman Collection
Monitor and Visibility of Learned Routes and Advertised Routes by API
BGP Ingress and Egress Filters Usage by API
Overview IX-API
Quick API Reference
Monitor your services
Account administration
Add new users or subcustomers
Manage user roles and permissions
Multi-Factor-Authentification
Retrieving username and reset password
Delete a user
Customer service and ticket system
Table of Contents
- All Categories
- API
- Cloud ROUTER API
- BGP Ingress and Egress Filters Usage by API
BGP Ingress and Egress Filters Usage by API
Updated by Miralem Cebic
BGP Ingress and Egress Filters Usage by API
In the context of the DE-CIX Cloud ROUTER APIs, BGP ingress and egress filters are powerful tools that allow customers to control the flow of routing information. These filters can be configured to process, modify, or block route advertisements either inbound (ingress) or outbound (egress). This capability is essential for managing route visibility, optimizing traffic, and enforcing routing policies.
Key Concepts of Ingress and Egress Filters
- Ingress Filters:
- Applied to routes received from external peers or network services (e.g., AWS, Azure, Google Cloud).
- Allow customers to define which prefixes should be accepted, rejected, or modified before they are added to the routing table of the Cloud ROUTER.
- Use cases:
- Block unauthorized or undesirable prefixes.
- Modify attributes like local preference for specific prefixes to influence traffic paths.
- Egress Filters:
- Applied to routes advertised to external peers or network services.
- Allow customers to control which prefixes are sent and how they are presented (e.g., adding AS path prepending).
- Use cases:
- Prevent the advertisement of specific prefixes.
- Manipulate attributes to influence how external peers route traffic back.
API Configuration Overview
Filters are configured using Policies and Prefix Lists:
Step 1: Prefix Lists
Define the list of prefixes to match during filtering.
Example:
{
"name": "rfc1918",
"managing_account": "1461",
"consuming_account": "1461",
"match_list": [
{ "prefix": "10.0.0.0/8", "max_length": 32 },
{ "prefix": "192.168.0.0/16", "max_length": 32 }
]
}
Step 2: Policies
Combine filtering actions with prefix matching.
Example:
{
"name": "example-policy",
"managing_account": "1461",
"consuming_account": "1461",
"entries": [
{
"sequence_number": 10,
"match_prefix_list": "rfc1918",
"action": {
"local_preference": 120,
"as_path_prepend": null,
"filter": "accept"
}
},
{
"sequence_number": 20,
"action": {
"local_preference": null,
"as_path_prepend": 2,
"filter": "reject"
}
}
]
}
How Filters Are Applied
Ingress Filters:
Attach a policy to an inbound direction on a network service, controlling how received routes are processed.
Example:
{
"attach_policy": {
"direction": "ingress",
"policy_id": "example-policy"
}
}
Egress Filters:
Attach a policy to an outbound direction, managing the routes advertised to peers.
Example:
{
"attach_policy": {
"direction": "egress",
"policy_id": "example-policy"
}
}
Use Cases
Route Optimization:
- Ensure that only desired routes are accepted or advertised.
- Modify route preferences to balance traffic across multiple connections.
Traffic Engineering:
- Use AS Path Prepending to make specific paths less preferable to external peers.
Security and Compliance:
- Block malicious or incorrect prefixes to protect the network.
- Ensure only authorized prefixes are advertised to comply with routing policies.
Key Benefits
- Flexibility: Define fine-grained control over routing behavior.
- Scalability: Manage routing preferences across multiple connections seamlessly.
- Security: Prevent unauthorized or harmful route propagation.
- Ease of Use: Configure filters using intuitive API endpoints.
Conclusion
BGP ingress and egress filters, configured through Prefix Lists and Policies, are indispensable for managing routing effectively in the DE-CIX Cloud ROUTER. By leveraging these tools, customers can achieve greater control over their networks, optimize traffic flow, and enhance security. The API makes it simple to implement these configurations, ensuring smooth and reliable operation of routing policies.