Acceptable Use Policy
All participants and their traffic flowing through OpenIX must adhere to this Acceptable Use Policy. The AUP is designed to maintain the integrity, security, and fairness of the exchange for everyone. Violation of the AUP can result in immediate action, including suspension of the offending port or termination of the participant’s connection (see Termination section). By connecting to OpenIX, participants agree not to engage in any of the following prohibited activities:
No Abuse of the Exchange Fabric
Participants shall not flood the exchange with excessive broadcast, unknown-unicast, or multicast traffic beyond normal operational needs (e.g., only ARP/ND and occasional multicast for routing protocols if any are acceptable). Intentional transmission of continuous high-volume broadcast or multicast traffic, or any form of traffic flooding that could disrupt exchange operations or consume unnecessary switch capacity, is prohibited.
No Malicious Traffic or Attacks
The exchange must not be used to conduct denial-of-service attacks, intrusion attempts, or any malicious cyber activities targeting other participants or external networks Participants must ensure that their connected equipment is not launching attacks (for instance, not part of a botnet using the IX to scan or attack others).
If a participant becomes aware that their network is sourcing an attack (e.g., a compromised server spewing traffic), they are expected to take immediate action to stop it. OpenIX may proactively filter or disconnect a port if it is observed participating in an ongoing attack to protect the community. Additionally, obviously malicious traffic such as constant port scans or exploitation attempts directed at others via the IX is forbidden.
No Eavesdropping or Snooping
Participants should only send and receive traffic intended for their own networks or those of their peering agreements. Interception of other participants’ traffic (e.g., via ARP spoofing, MAC flooding, or other man-in-the-middle techniques) is strictly prohibited. The exchange fabric is a shared medium, but OpenIX implements isolation such that participants should only see traffic addressed to them. Any attempt to circumvent these protections to capture or inspect another network’s traffic is a severe violation and likely illegal.
No Third-Party Transit
As noted in the Peering Policy, participants may not use the exchange to carry traffic for third parties that are not themselves connected and in mutual agreement. Each participant’s port is for exchanging traffic between that participant’s network (and its customers) and other connected networks. It is not to be resold or used as a general transit link between two other networks.
For example, if Network A is connected, they cannot offer to carry traffic across the IX for Network C that is not present at OpenIX. Similarly, a participant should not extend connectivity from the IX port to another external entity (e.g., by physically patching in another ISP or customer to their port) without authorization from OpenIX. All traffic on the exchange should originate from or be destined to the participant’s own network and its direct customers or peers.
No Unauthorized Sharing or Reselling of Ports
A participant’s port is meant for that participant’s sole use (and their internal network or customer routes as per normal BGP). Participants are not allowed to share their port with other organizations or entities that are not officially registered with OpenIX as part of their organization.
For example, two ISPs cannot split the cost of one port and each use it for their own ASN without notifying OpenIX — each distinct network ASN connecting should have its own agreement with OpenIX (or a formal reseller arrangement if one is acting as a reseller for remote peering, which would be explicitly authorized by OpenIX). If a participant is found to be informally reselling or allowing an unauthorized party to piggyback on their connection, OpenIX will consider this a breach of policy.
Adherence to Technical Rules
All technical standards outlined in the previous section must be followed as part of acceptable use. This includes not sending disallowed Layer-2 protocols (no STP, CDP, etc.), using only the assigned MAC and IP addresses, and not exceeding reasonable usage of ARP/ND. Participants should also ensure no DHCP or other unauthorized services are active on the exchange interface. Violating technical requirements (even accidentally) is considered non-compliance with the AUP. OpenIX will typically alert the participant if, for example, an STP BPDU is detected from their port, but repeated incidents can lead to port shutdown.