Network Setup

This page provides detailed configuration instructions for setting up Direct Market Access (DMA) network connectivity to the Bitnomial Exchange.

AWS PrivateLink allows the exchange to share an AWS Network Load Balancer (NLB) with another AWS account easily.

The exchange needs the DMA participant's AWS account ID and the DMA participant needs the exchange's VPC Endpoint service name and ports for the various services. Contact help@exchange.bitnomial.com to exchange this information.

  1. Exchange adds DMA participant's AWS account to the list of authorized AWS accounts on the PrivateLink service
  2. The DMA participant adds an Interface type VPC Endpoint with the exchange's VPC Endpoint service name to their VPC with an appropriate security group.

AWS Direct Connect

AWS Direct Connect allows DMA participants to connect to AWS from their private datacenter over a fiber connection. Contact help@exchange.bitnomial.com to learn more about the AWS Direct Connect onboarding

VPC Peering

DMA participants can use AWS VPC Peering to peer DMA participant VPCs with Bitnomial VPCs.

  1. Bitnomial assigns VPC CIDR block and Availability Zone to the DMA participant.
  2. The participant reports VPC ID and AWS Account ID to Bitnomial.
  3. Bitnomial sends peering request to the participant, and reports request ID to the participant.
  4. Participant accepts peering request and creates route to Bitnomial subnet.

Example VPC Peering Values

The tables below outlines example values for what information needs to be exchanged.

From the participant to Bitnomial:

Participant → BitnomialValue
Participant Account ID0000000000
Participant VPC IDvpc-iab32123

From Bitnomial to the participant:

Bitnomial → ParticipantValue
Bitnomial CIDR Block10.240.0.0/16
Participant VPC CIDR Block10.192.5.0/24
VPC Availability Zoneus-east-2a
Peering Request IDpcx-afb2f421
Gateway IP:Port10.240.2.32:9000
Pricefeed IP:Port10.240.4.42:9001

VPN

Customer DMA connectivity is provided via an IPsec VPN using BGP routing. A primary and backup tunnel are provided for fail-over redundancy.

To establish a VPN connection (4 steps):

1. Customer Information Gathering

The customer reports the intended public IP address of the VPN server to Bitnomial.

2. Bitnomial VPN Configuration

Bitnomial provisions customer access and the VPN connection and reports the primary and backup tunnel IP addresses to the customer. Primary and backup pre-share keys will be communicated via a conference call set up by Bitnomial.

3. Customer VPN Configuration

The customer configures Primary/Backup Tunnels Phase 1 (IKE) with the following information:

ConfigurationValue
IKE versionIKEv1
Authentication MethodPre-Shared Key
Authentication Algorithmsha1
Encryption Algorithmaes-128-cbc
Lifetime28800 seconds
Phase 1 Negotiation Modemain
Diffie-HellmanGroup 2

The customer configures Primary/Backup Tunnels Phase 2 (IPsec) with the following information:

ConfigurationValue
Protocolesp
Authentication Algorithmhmac-sha1-96
Encryption Algorithmaes-128-cbc
Lifetime3600 seconds
Modetunnel
Perfect Forward SecrecyDiffie-Hellman Group 2

4. VPN Tunnel Confirmation

Both Bitnomial and the customer confirm primary and backup tunnel statuses are UP.

Routing

Bitnomial uses static IP routing and address blocks to avoid overlapping IP addresses (per RFC 1918). Customers assign hosts within the assigned range. For example, a customer may be assigned a CIDR Block of the form 10.192.5.0/24.

Firewalls need to allow TCP traffic from the order entry gateway/pricefeed IPs and ports that have been allocated. Customers can test exchange connectivity by attempting to login to their order entry gateway/pricefeed.

Note: ICMP messages (pings) are disabled.

Start Trading

Trade US Perpetual Futures, Physical Futures, and Options on the Bitcoin Complex®, XRP, ETH, SOL, and more.