Building an ultra low latency and highly redundant networks is what drives us each morning! We carefully choose what path the traffic should take to ensure our network is ultra low latency.


Quality of Service: we queue VOIP traffic so it gets into the highest hardware queue in order to be processed ahead of other type of traffic.


Wether it's latency, jitter or MoS, we track them all so you can have a direct access and view on these data. Transparency about what you can expect is a must for us.


Our exchange is multi locations enabled. You can join it from Belgium, Netherlands , Luxembourg. Soon it will expand to United Kingdom, France, Spain, Portugal, Italy and more locations.


Whenever possible we encrypt traffic using MACSec. Sometimes we do it directly on our equipment and sometimes we purchase encrypted DWDM Wavelength directly from our providers.
Fill-in this form and we'll contact you for a quick and smooth onboarding

BGP Peering Policy

1. General Overview

This BGP peering policy outlines the requirements and expectations for establishing BGP peering with other networks at VoIP-IX.net. The goal of this policy is to ensure reliable and efficient routing between our network and other networks.

2. BGP Peering Requirements

2.1. IP Addressing:

Before establishing BGP peering, each member will be assigned a unique, valid public IP address by VoIP-IX.net. Members are responsible for ensuring that their BGP router is configured with the assigned IP address.

2.2. BGP Version:

Both parties must use compatible BGP protocol versions. We recommend using the latest version of BGP that is supported by all parties.

2.3. AS Numbers:

Each party must have a unique and valid Autonomous System (AS) number. This number must be registered with a recognized Internet registry such as:

African Network Information Center (AFRINIC)
American Registry for Internet Numbers (ARIN)
Asia-Pacific Network Information Centre (APNIC)
Latin American and Caribbean Internet Addresses Registry (LACNIC)
Réseaux IP Européens Network Coordination Centre (RIPE NCC)
2.4. Routing Policies:

Each party must define and implement their routing policies. These policies must be agreed upon by both parties and must not conflict with each other. The policies should include:

The list of prefixes to be advertised and received
The maximum number of prefixes that can be advertised and received
The preferred path for inbound traffic
The preferred path for outbound traffic
The use of community attributes
2.5. Security:

Both parties must implement security measures to protect their BGP peering connections. These measures may include access lists, authentication mechanisms, and encryption. 

2.6. Member's Requirements:

In addition to the above requirements, members must also meet the following criteria:

Have a public Autonomous System (AS) number 
Have up-to-date PeeringDB and RIR Whois information
Have at least one IPv4 /24 or IPv6 /48 to announce
Be able to use the route servers available
Only send traffic to destinations advertised by BGP on the Peering LAN
Will not advertise or export the VoIP-IX.net prefixes externally

2.7. Route Server:

VoIP-IX.net offers the possibility, hence this is optional, to its members to peer with one or two route servers. The route server allows members to reduce the number of BGP peering sessions required to peer with other members on the exchange. Instead of peering directly with every member, a member can peer with the route server and receive the BGP routes from all other members peering with the route servers.

The route servers IPv4 are:

The VoIP-IX.net BGP ASN is:


2.8. Quality of Service (QoS):

VoIP-IX.net applies specific QoS rules for VoIP traffic to ensure high-quality voice communications by prioritizing VoIP traffic over other types of traffic.

VoIP-IX.net monitors the network and may adjust QoS rules as necessary to ensure the highest quality of VoIP traffic.

2.9. Open Policy:

VoIP-IX.net has an open peering policy, which means that we welcome peering requests from any interested party that meets our peering requirements. We believe in the importance of open peering to promote the growth and stability of the Internet.

To request peering with VoIP-IX.net, interested parties should contact our peering team and provide the following information:

IP addresses to be announced
Peering policy (including prefix limits, filtering, etc.)
PeeringDB entry
We will evaluate each request based on our peering requirements and network topology. If the request is accepted, we will work with the party to establish BGP peering.

We encourage members to engage with us to ensure that we continue to meet the changing needs of the Internet and to promote the growth of the global network.

2.10. Default Route:

Members must not point a default route to VoIP-IX.net.
Members must send traffic to prefixes that are being advertised by members exclusively.

3. BGP Peering Configuration

3.1. Physical Connectivity:

The physical connectivity between the two BGP routers must be established before configuring BGP peering.

3.2. BGP Peering Parameters:

The following BGP peering parameters must be configured on both sides:

The IP address of the neighbor router (assigned by VoIP-IX.net or route server)
The AS number of the neighbor router
The BGP version to be used
The routing policies to be implemented
3.3. BGP Peering Monitoring:

BGP peering must be monitored regularly to ensure that it is functioning properly. Monitoring should include:

Tracking the number of BGP prefixes received and advertised
Checking the BGP peering status
Analyzing BGP logs for errors or anomalies

4. BGP Peering Troubleshooting

If there are issues with BGP peering, both parties should work together to troubleshoot the problem. This may include checking the BGP configuration, monitoring logs, and performing tests.

5. Question, remarks, suggestions

Please address them to peer@voip-ix.net


Coming soon


At VoIP-IX.net, we take the security of our platform and our users' data very seriously. We have implemented a number of security measures to protect against unauthorized access, disclosure, or destruction of data. This policy outlines the measures we have put in place to ensure the security of our platform and our users' data.

Access Control: Access to our platform and user data is restricted to authorized personnel only. All employees, contractors, and third-party service providers are required to sign confidentiality agreements and comply with our security policies. Access to our platform and data is granted on a need-to-know basis, and all access is monitored and logged.

Data Encryption: All user data is encrypted in transit and at rest using industry-standard encryption protocols. We use SSL/TLS encryption for all data transmitted between users and our servers. Data at rest is encrypted using AES 256-bit encryption, and encryption keys are securely managed.

Data Backup and Recovery: We perform regular backups of our data to ensure that data can be recovered in the event of a disaster or system failure. Backups are stored offsite in secure facilities and are encrypted for added security. We have also implemented disaster recovery plans to ensure that our platform can be quickly restored in the event of a catastrophic event.

Physical Security: Our servers and data centers are physically secured to prevent unauthorized access. We use state-of-the-art data centers that are equipped with redundant power supplies, climate control, and fire suppression systems. Access to our data centers is restricted to authorized personnel only, and all access is monitored and logged.

Vulnerability Management: We regularly scan our platform for vulnerabilities and implement measures to mitigate any identified risks. We also perform regular penetration testing to identify and address any potential security issues.

Incident Response: In the event of a security incident, we have established procedures in place to contain the incident, assess the damage, and take corrective action. We will promptly notify affected users of any breach of their personal data as required by law.

Exchange Security Measures: In addition to the above measures, we have implemented the following security measures specifically for the exchange:

  • Only one MAC address is allowed per port. Traffic from any unknown MAC address will be dropped, providing additional protection against unauthorized access.
  • Port dampening will disable your port for 5 minutes after 10 transitions within 60 seconds, preventing network flooding and disruption.
  • The peering VLAN can only be used for IPv4 and IPv6 unicast traffic, providing additional protection against malicious traffic.
  • Storm control is implemented to prevent network congestion and disruption caused by broadcast, multicast, or unicast storms.

Compliance: We comply with all applicable data privacy and security regulations, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other relevant laws and regulations.

This security policy is regularly reviewed and updated to ensure that it reflects the latest security best practices and industry standards. We are committed to providing a secure and reliable platform for our users, and we will continue to invest in security measures to maintain the integrity of our platform and protect our users' data.


1G through another Fabric (Equinix, Digital Realty, ...)249€2739€FREE
10G through another Fabric (Equinix, Digital Realty, ...)249€2739€FREE


Peering TypeMRCNRCTerms
Public VLAN FREE FREENo commit opt-out anytime
Private VLAN LonghaulBandwidth based FREENo commit opt-out anytime
Private VLAN Local / Metro FREE FREENo commit opt-out anytime


Having spent 15 years in the VoIP industry, we think that a proper place to bring VoIP actors altogether lacks. Including a place where regulated interconnections could take place as well. We have and are building VOIP IX, with ultra low latency and open source technology in mind. The latter allows us to run with less power requirements than it would with a traditional equipment, enabling greener interconnections. It also impacts the price at which we can offer this service. We are not only providing our members with the best connectivity option available on the market but also with all the metrics that a VoIP company needs in order to build the best connections towards its peers. We are eager to get feedback about the way we build our IX but as well on the initiative itself. So feel free to contact us for any comment, suggestion or remarks at peer [at] voip-ix [dot] net .




Unlock seamless and secure SIP interconnection with our Hosted Regulated Interconnection Service. Designed for telecommunications operators and VoIP providers, our solution ensures compliance with stringent regulatory requirements while offering robust connectivity and exceptional quality of service.

Key Benefits:

  • Regulatory Compliance: Meet all regulatory standards effortlessly.
  • Cost Efficiency: Reduce operational costs with our hosted infrastructure.
  • Scalability: Easily scale your services as your business grows.
  • Enhanced Security: Benefit from top-tier security measures to protect your communications.

Our state-of-the-art data centers provide a reliable and efficient interconnection point, allowing you to focus on your core business while we handle the complexities of SIP interconnectivity.

Experience the future of interconnection with our advanced, compliant, and cost-effective hosted service.


Achieve seamless connectivity with Europe's leading telecommunications operators through our European Incumbent Interoperability Testing service. Our expertise ensures that your network and services are fully compatible with major European incumbents, enabling smooth and reliable integration.

Key Features:

  • Proven Compatibility: Our service ensures successful interoperability testing with the top European incumbent operators, guaranteeing that your systems work flawlessly with their networks.
  • Regulatory Compliance: We help you meet all European regulatory requirements, simplifying the compliance process and ensuring your services adhere to the highest standards.
  • Comprehensive Testing: Our rigorous testing process covers all aspects of interoperability, from protocol compatibility to performance and security, ensuring your services are robust and reliable.
  • Expert Support: Benefit from our team of experienced professionals who provide guidance and support throughout the testing process, ensuring any issues are quickly resolved.

Our European Incumbent Interoperability Testing service is designed for telecommunications operators and VoIP providers looking to expand their reach and ensure their services are compatible with the leading networks in Europe. With our service, you can confidently integrate with incumbent operators, providing your customers with seamless and high-quality connectivity.

Ensure your network is ready for Europe’s top incumbents with our comprehensive interoperability testing service. Contact us today to learn more and get started.

2 Av Léon Champagne
1480 Saintes
Mail : peer@voip-ix.net
Tel. +32 498 62 53 24
VAT : BE 0761.936.285
General Terms and Conditions


Ripe Membership Logo
AWEXPeeringDB white logo