Operated under ASN AS47263

Stay online — even under attack

FREE on-net IP Transit (Layer 2 only) and Remote DDoS Mitigation via GRE. Dual-stack IPv4/IPv6, RPKI-ROV, IRR policies — with optional BGP Flowspec and RTBH.

On-net IP Transit
FREE (Layer 2 only)

Usage billed €0.45/Mbps (95/5). No transit over GRE.

Remote delivery
DDoS Mitigation via GRE

€120/month incl. 150 TB traffic.

24/7 NOC SLA available IPv6-first
Edge / Scrubber
DDoS Filter
BGP Core
AS47263
IP Transit
FREE, L2 only (on-net)
Remote via GRE
DDoS Mitigation only
DDoS Mitigation
always-on / on-demand
IPv6 native
/48 on request
RPKI & IRR
Route validation

Schematic — simplified.

Products

Choose what you need — scale as you grow.

DDoS Mitigation (Remote via GRE)

always-on / on-demand

Protect your prefixes anywhere. We provide tunnel endpoints; MD5 auth and BFD supported.

  • €120/month incl. 150 TB traffic
  • Remote delivery via GRE (dual-stack)
  • Activation: BGP trigger / RTBH
  • Optional BGP Flowspec (granular rules)
  • Live mitigation logs (optional)
Note: IP Transit over GRE is not available.

IP Transit (FREE, Layer 2 only)

on-net

On-net transit with RPKI-validated routing and flexible communities. Delivered over Layer 2 cross-connect/VLAN.

  • FREE port · usage billed €0.45/Mbps (95/5)
  • Delivery: Layer 2 only (no IP Transit over GRE)
  • Policies: IRR filters & RPKI-ROV
  • Communities: traffic shaping, blackholing
  • Dual-stack IPv4/IPv6

Orders are handled in the AS47263 customer dashboard. You can also create a ticket if you prefer assisted onboarding.

IP Transit — Details

On-net transit via Layer 2 cross-connect/VLAN. Clean routing, sane defaults, and transparent policies — built by engineers for engineers.

Pricing
Free Port · €0.45/Mbps (95/5)

No monthly port fee on-net. 95th percentile billing. Example: 300 Mbps @95th → €135/mo.

Delivery
Layer 2 only
  • 802.1Q VLAN handoff (single VLAN)
  • 1G / 10G / 25G / 100G interfaces
  • Jumbo MTU up to 9100 (on request)
  • LAG/LACP optional

Transit over GRE is not offered.

Routing
Dual-stack BGP
  • eBGP IPv4 + IPv6 (separate sessions)
  • BFD & MD5 supported
  • RPKI-ROV enforced, IRR filters
  • RTBH & optional Flowspec
Operations
NOC & SLA
  • 24/7 NOC with clear runbooks
  • Maintenance windows announced
  • Per-customer route-policy
  • Usage graphs in dashboard

Technical specification

Hand-off 1G/10G/25G/100G (SR/LR), 802.1Q
MTU 1500 default, up to 9100 on request
Redundancy LAG/LACP or dual-VLAN
BGP eBGP v4/v6, multipath on request
Security RPKI-ROV, IRR allow-lists, prefix/AS-PATH filters
Controls RTBH community, optional Flowspec
Step 1
Cross-connect

Order an L2 cross-connect/VLAN to our demarc at the on-net facility. We’ll provide LOA/CFA and the port details.

Step 2
BGP turn-up

Exchange your router IPs, ASNs, ROAs and IRR objects. We enable RPKI/IRR filters, set communities and test failover.

Step 3
Go live & observe

You get usage graphs and 95/5 billing in the dashboard. Optional: RTBH/Flowspec controls and per-prefix stats.

Example — Cisco IOS-XE
router bgp <yourASN>
 neighbor <AS47263_IPv4> remote-as 47263
 neighbor <AS47263_IPv4> description AS47263 v4
 neighbor <AS47263_IPv4> ebgp-multihop 2
 neighbor <AS47263_IPv4> password <md5>
 !
 address-family ipv4
  neighbor <AS47263_IPv4> activate
  maximum-paths 4
 exit-address-family
!
ipv6 router bgp <yourASN>
 neighbor <AS47263_IPv6> remote-as 47263
 address-family ipv6
  neighbor <AS47263_IPv6> activate
                
Example — Juniper
protocols {
  bgp {
    group AS47263-v4 {
      type external;
      peer-as 47263;
      neighbor <AS47263_IPv4>;
    }
    group AS47263-v6 {
      type external;
      peer-as 47263;
      family inet6 unicast;
      neighbor <AS47263_IPv6>;
    }
  }
}
policy-options { /* attach your export with IRR/RPKI-valid prefixes only */ }
                
Example — FRR
router bgp <yourASN>
 bgp router-id <yourIPv4>
 neighbor AS47263-v4 remote-as 47263
 neighbor AS47263-v4 password <md5>
 neighbor AS47263-v4 ebgp-multihop 2
 address-family ipv4 unicast
  neighbor AS47263-v4 activate
 exit-address-family
 !
 neighbor AS47263-v6 remote-as 47263
 address-family ipv6 unicast
  neighbor AS47263-v6 activate
 exit-address-family
                

Policy & communities

We publish a simple community guide in the dashboard after turn-up (traffic shaping, blackholing, prepend options, ingress/egress hints). Blackholing is available via a dedicated RTBH community. Flowspec can be enabled per customer on request.

Tip: make sure your ROAs are valid before advertising; our RPKI-ROV rejects invalid routes by default.