Page tree
Skip to end of metadata
Go to start of metadata

CME CERT Data Center is a customer-managed connectivity solution providing access to the CME Certification and New Release platforms within CME Co-location facilities at DC3 in Aurora, 350 East Cermak, Equinix NY4/NY5 in Secaucus and Equinix LD4/LD5 in Slough.

Establishing Cert Data Center Connectivity

  1. Contact your Global Account Manager to review the offering and review required paperwork.
  2. After paperwork is received, the CME Group ECHO (Exchange Connectivity & Hosting Operations) team will contact you.

Technical Overview

Circuit Specifications

1 Gig

  • single cross connect with 1 Gbps hand-off
  • Single-mode fiber
  • 1000BASE-LH long-wavelength/long haul

CertDataCenter


  • All connections at the facility are single-mode fiber.
  • A and B feeds are sourced from the same data center.

CERT Data Center Connectivity Procedures

Customer Requirements

For CERT Data Center connectivity, customers must meet the following requirements:

  • At a minimum the customer must provide a router or Layer 3 switch to terminate the 1 gbps single-mode fiber cross-connect, however,
  • The point-to-point IP address must be configured on the interface closest to CME Group device.
  • CME Group recommends that the customer check the Signal/Light levels at the time of turn up in order to attenuate levels to protect equipment.
  • Customer’s use of media converters is not recommended.
  • The customer’s SFP or GBIC must be compatible with long wavelength/long haul 1000BASE-LH SFPs.

Routing Requirements

  • Customer routers must be capable of using advanced TCP/IP Protocols including BGP and multicast, specifically PIM Sparse Mode.
  • BGP routing must be used on the routers terminating CME Group connections.
  • All IP packets destined for CME Group must be sourced from CME Group-assigned private address space.
  • Multicast PIM Sparse Mode must be used.

Restrictions

The following restrictions apply to CERT Data Center connectivity:

  • No site-to-site connectivity.
  • No direct server connectivity into CME CERT/NR.
  • CME Group will not accept traffic sourced from any customer’s public IP space.
  • Customer hardware must be capable of supporting quote streams (e.g., PIM sparse mode).