Peering Policy — UZA NETWORKS (AS270160)

Our PeeringDB record is the canonical source for ASN, AS-SET, prefixes, traffic profile, ratio, facilities, and policy summary. This page documents what PeeringDB does not capture: detailed technical requirements, routing security posture, our CDN cache hosting program, and operational practices.

Technical Requirements

  • BGP-4 dual-stack (IPv4 + IPv6) on the same session pair
  • Routes registered in RADB or LACNIC IRR, reachable via AS-SET AS270160:AS-CONE
  • RPKI-valid routes preferred; invalids are dropped at ingress
  • Max-prefix limits are agreed per session at establishment, sized to the peer's expected announcement profile, with teardown thresholds enforced
  • MD5 authentication optional, supported on request
  • For prefixes originated by a downstream of yours, a Letter of Authorization (LOA) is required before acceptance

Routing Security

  • RPKI: all originated prefixes signed and valid in LACNIC TAL; invalids dropped at ingress
  • BCP38 / source-address filtering enforced on all customer-facing interfaces
  • AS-SET AS270160:AS-CONE maintained in RADB
  • MANRS participation under evaluation; principles already followed operationally

CDN Cache Hosting

We actively welcome embedded content cache deployments at our edge POPs. Our facilities aggregate growing residential broadband traffic in San Luis de la Paz and San José Iturbide, Guanajuato, with additional presence at KIO Querétaro 1 (QRO1). Our infrastructure is engineered to host nodes for:

  • Netflix Open Connect Appliance (OCA)
  • Google Global Cache (GGC)
  • Akamai AANP
  • Meta FNA
  • Cloudflare ECT
  • Equivalents from other content networks

What we provide: Rack space, A+B power, optical uplinks to our edge (10G/100G), dedicated IPv4 + IPv6 allocations, unmetered transit for cache-fill, and 24/7 NOC support.

This is a strategic priority for us — our footprint sits outside the dense CDN hubs in CDMX/QRO, meaning embedded caches materially reduce backhaul costs and dramatically improve subscriber experience.

Contact peering@uza.mx to evaluate a deployment.

What We Do Not Do

  • We do not announce or accept default routes to/from peers
  • We do not provide transit via peering — peer routes are not re-announced to other peers or upstreams
  • We do not accept prefixes longer than /24 (IPv4) or /48 (IPv6) unless explicitly agreed
  • We do not peer over unverified layer-2 transport without prior agreement

Operational

  • Planned maintenance: notified to active peers at least 72 hours in advance via peering@uza.mx
  • Emergency change: post-event notification within 1 hour
  • 24/7 NOC for session and reachability issues
  • Looking glass: available on request to verified peers
  • Public BGP visibility via the Qrator Radar collector (AS197068) and standard public collectors

Contacts

Role Contact
Peering peering@uza.mx
NOC (24/7) noc@uza.mx · +52 442 492 4665
Abuse abuse@uza.mx
Last updated: 2026-05-13.