Dieses Wiki ist ein Archiv bis 2023. Das aktuelle Wiki findet sich unter https://wiki.hamburg.ccc.de/
Difference between revisions of "Freifunk:VPN1"
m (added new vpn nodes) |
m |
||
Line 327: | Line 327: | ||
bgp log-neighbor-changes | bgp log-neighbor-changes | ||
bgp bestpath as-path confed | bgp bestpath as-path confed | ||
+ | |||
network 10.4.2.0/24 | network 10.4.2.0/24 | ||
network 10.112.0.0/13 | network 10.112.0.0/13 | ||
Line 332: | Line 333: | ||
network 10.124.0.0/15 | network 10.124.0.0/15 | ||
network 10.126.0.0/16 | network 10.126.0.0/16 | ||
+ | |||
neighbor ff-peers4 peer-group | neighbor ff-peers4 peer-group | ||
neighbor ff-peers4 update-source 10.207.0.9 | neighbor ff-peers4 update-source 10.207.0.9 | ||
Line 346: | Line 348: | ||
neighbor 10.207.0.1 peer-group ff-peers4 | neighbor 10.207.0.1 peer-group ff-peers4 | ||
neighbor 10.207.0.1 description Leipzig1 | neighbor 10.207.0.1 description Leipzig1 | ||
− | |||
neighbor 10.207.0.2 remote-as 65041 | neighbor 10.207.0.2 remote-as 65041 | ||
Line 355: | Line 356: | ||
neighbor 10.207.0.3 peer-group ff-peers4 | neighbor 10.207.0.3 peer-group ff-peers4 | ||
neighbor 10.207.0.3 description Weimar1 | neighbor 10.207.0.3 description Weimar1 | ||
− | |||
neighbor 10.207.0.4 remote-as 65042 | neighbor 10.207.0.4 remote-as 65042 | ||
neighbor 10.207.0.4 peer-group ff-peers4 | neighbor 10.207.0.4 peer-group ff-peers4 | ||
neighbor 10.207.0.4 description Weimar2 | neighbor 10.207.0.4 description Weimar2 | ||
− | |||
neighbor 10.207.0.5 remote-as 65040 | neighbor 10.207.0.5 remote-as 65040 | ||
Line 369: | Line 368: | ||
neighbor 10.207.0.6 peer-group ff-peers4 | neighbor 10.207.0.6 peer-group ff-peers4 | ||
neighbor 10.207.0.6 description Berlin2 | neighbor 10.207.0.6 description Berlin2 | ||
− | |||
neighbor 10.207.0.7 remote-as 65043 | neighbor 10.207.0.7 remote-as 65043 | ||
Line 378: | Line 376: | ||
neighbor 10.207.0.8 peer-group ff-peers4 | neighbor 10.207.0.8 peer-group ff-peers4 | ||
neighbor 10.207.0.8 description Erfurt2 | neighbor 10.207.0.8 description Erfurt2 | ||
− | |||
neighbor 10.207.0.11 remote-as 65045 | neighbor 10.207.0.11 remote-as 65045 | ||
neighbor 10.207.0.11 peer-group ff-peers4 | neighbor 10.207.0.11 peer-group ff-peers4 | ||
neighbor 10.207.0.11 description Stuttgart1 | neighbor 10.207.0.11 description Stuttgart1 | ||
− | |||
neighbor 10.207.0.12 remote-as 65045 | neighbor 10.207.0.12 remote-as 65045 | ||
neighbor 10.207.0.12 peer-group ff-peers4 | neighbor 10.207.0.12 peer-group ff-peers4 | ||
neighbor 10.207.0.12 description Stuttgart2 | neighbor 10.207.0.12 description Stuttgart2 | ||
− | |||
neighbor 10.207.0.13 remote-as 65046 | neighbor 10.207.0.13 remote-as 65046 | ||
Line 397: | Line 392: | ||
neighbor 10.207.0.14 peer-group ff-peers4 | neighbor 10.207.0.14 peer-group ff-peers4 | ||
neighbor 10.207.0.14 description Halle2 | neighbor 10.207.0.14 description Halle2 | ||
− | |||
neighbor 10.207.0.15 remote-as 65047 | neighbor 10.207.0.15 remote-as 65047 | ||
neighbor 10.207.0.15 peer-group ff-peers4 | neighbor 10.207.0.15 peer-group ff-peers4 | ||
neighbor 10.207.0.15 description Aurich1 | neighbor 10.207.0.15 description Aurich1 | ||
+ | |||
+ | neighbor 10.207.0.16 remote-as 65048 | ||
+ | neighbor 10.207.0.16 peer-group ff-peers4 | ||
+ | neighbor 10.207.0.16 description Chaos-Communication-Camp | ||
+ | |||
+ | neighbor 10.207.0.17 remote-as 65050 | ||
+ | neighbor 10.207.0.17 peer-group ff-peers4 | ||
+ | neighbor 10.207.0.17 description Ausgburg1 | ||
neighbor 10.207.1.1 remote-as 35492 | neighbor 10.207.1.1 remote-as 35492 | ||
Line 410: | Line 412: | ||
neighbor 10.207.1.2 peer-group ff-peers4 | neighbor 10.207.1.2 peer-group ff-peers4 | ||
neighbor 10.207.1.2 description Wien2 | neighbor 10.207.1.2 description Wien2 | ||
− | neighbor 10.207.1.2 | + | |
+ | neighbor 10.207.2.1 remote-as 65049 | ||
+ | neighbor 10.207.2.1 peer-group ff-peers4 | ||
+ | neighbor 10.207.2.1 description Zagreb1 | ||
+ | |||
+ | neighbor 10.207.255.1 remote-as 65041 | ||
+ | neighbor 10.207.255.1 peer-group ff-peers4 | ||
+ | neighbor 10.207.255.1 description Leipzig-FOO | ||
distance bgp 150 150 150 | distance bgp 150 150 150 | ||
Line 417: | Line 426: | ||
network 2001:6f8:982::/48 | network 2001:6f8:982::/48 | ||
network 2001:6f8:1300::/48 | network 2001:6f8:1300::/48 | ||
+ | network 2001:4830:1739::/48 | ||
neighbor ff-peers6 activate | neighbor ff-peers6 activate | ||
neighbor ff-peers6 soft-reconfiguration inbound | neighbor ff-peers6 soft-reconfiguration inbound | ||
Line 423: | Line 433: | ||
exit-address-family | exit-address-family | ||
! | ! | ||
− | access-list | + | access-list access permit 127.0.0.1/32 |
− | access-list | + | access-list access permit 10.35.2.8/32 |
+ | access-list access permit 10.35.3.0/24 | ||
+ | access-list access permit 172.31.0.0/24 | ||
+ | access-list access deny any | ||
! | ! | ||
ip prefix-list bgp4in description BGP IPv4 import filter | ip prefix-list bgp4in description BGP IPv4 import filter | ||
Line 436: | Line 449: | ||
ip prefix-list bgp4out seq 99 deny any | ip prefix-list bgp4out seq 99 deny any | ||
! | ! | ||
− | ipv6 access-list | + | ipv6 access-list access permit ::1/128 |
− | ipv6 access-list | + | ipv6 access-list access permit 2001:6f8:982::/48 |
− | ipv6 access-list | + | ipv6 access-list access permit 2001:6f8:1300::/48 |
− | ipv6 access-list | + | ipv6 access-list access permit 2001:4830:1739::/48 |
+ | ipv6 access-list access deny any | ||
! | ! | ||
ipv6 prefix-list bgp6in description BGP IPv6 import filter | ipv6 prefix-list bgp6in description BGP IPv6 import filter | ||
Line 450: | Line 464: | ||
! | ! | ||
line vty | line vty | ||
− | access-class | + | access-class access |
− | ipv6 access-class | + | ipv6 access-class access |
! | ! | ||
end | end |
Revision as of 16:17, 18 August 2007
Dieser Node besteht momentan aus einem Soekris 4501 Board und soll die Verbindung zwischen den einzelnen Funkwolken in Hamburg und Freifunk Initiativen in anderen Staedten herstellen. Als VPN Software wird Tinc-VPN eingesetzt, wobei allerdings in Zukunft vermutlich auch andere VPN Protokolle unterstuetzt werden koennen. Eine kleine Hilfestellung auf Basis von OpenWRT kann man hier finden: Freifunk:IP:VPN_Connect
Leipzig hat fuer das IC-VPN ein Looking-Glass installiert, damit man das BGP aus der Leipziger Sicht anschauen kann. (br0ken)
Contents
- 1 Interfaces
- 2 Konfigurationen
- 2.1 Tinc-VPN
- 2.1.1 Hamburger Freifunk VPN (ffhh)
- 2.1.2 InterCity VPN (ffvpn)
- 2.1.2.1 ffvpn/tinc.conf
- 2.1.2.2 ffvpn/tinc-up
- 2.1.2.3 ffvpn/tinc-down
- 2.1.2.4 ffvpn/hosts/hhvpn1
- 2.1.2.5 ffvpn/hosts/berlin1
- 2.1.2.6 ffvpn/hosts/ffhallevpn1
- 2.1.2.7 ffvpn/hosts/erfurt1
- 2.1.2.8 ffvpn/hosts/leipzig1
- 2.1.2.9 ffvpn/hosts/leipzig2
- 2.1.2.10 ffvpn/hosts/aurich1
- 2.1.2.11 ffvpn/hosts/wien1
- 2.1.2.12 ffvpn/hosts/zagreb1
- 2.1.2.13 ffvpn/hosts/augsburg1
- 2.2 Quagga
- 2.3 Sonstiges
- 2.1 Tinc-VPN
Interfaces
Hier eine kurze Uebersicht ueber die verschiedenen Netzwerk-Interfaces.
eth0
Das eth0 Interface ist momentan noch ungenutzt.
Interface Name: eth0 IP Adresse : none Hostname : none Description : not used yet Bandwidth : 0bit
eth1
Das eth1 Interface ist zwar up, wird aber in der Regel ebenfalls nicht genutzt.
Interface Name: eth1 IP adresse : 193.158.228.140 Hostname : none Description : secondary uplink Bandwidth : 1500kbit/s
eth2
Ueber das eth2 Interface wird momentan die ganze VPN Geschichte abgewickelt. Es ist moeglich per SSH sich einzuloggen, sofern man den dafuer noetigen Account, oder Exploit hat. Das Tinc-VPN lauscht hier auf den Ports 655 und 656.
Interface Name: eth2 IP adresse : 62.206.27.20 Hostname : vpn1.hamburg.freifunk.net Description : primary uplink Bandwidth : 4000kbit/s
ffhh
Dieses Interface ist fuer das Hamburger Freifunk Netz eingerichtet. Tinc-VPN setzt dieses Interface in den TAP-Modus, damit Pakete zwischen den einzelnen VPN Clients wie bei einem Switch verschickt werden koennen. Der OLSR Daemon sendet seine Pakete an die Broadcast-Adresse (10.127.255.255) ueber dieses Interface.
Interface Name: ffhh IP Adresse : 10.112.1.1/12 Hostname : none Description : Freifunk Hamburg Software : tinc-vpn, olsrd Tinc-Port : 656
ffvpn
Fuer das InterCity-VPN wurde dieses Interface eingerichtet. Tinc-VPN setzt auch dieses Interface in den TAP-Modus und die Quagga Routing Suite kuendigt den Hamburger Freifunk IP-Bereich an entfernte BGP-Router. Wir verwenden die interne AS-Nummer 65044 fuer das BGP-Peering.
Interface Name: ffvpn IP Adresse : 10.207.0.9/16 Hostname : hamburg-r1.hamburg.freifunk.net Description : tunnel staedtekopplung Software : tinc-vpn, quagga(bgpd) Tinc-Port : 655 AS-Number : 65044
Konfigurationen
Tinc-VPN
Hamburger Freifunk VPN (ffhh)
ffhh/tinc.conf
AddressFamily=ipv4 Name = vpn1 PrivateKeyFile = /etc/tinc/ffhh/rsa_key.priv Mode = Switch PingTimeout = 30 Port = 656 BindToAddress = 62.206.27.20 Hostnames=yes ConnectTo = lok72 ConnectTo = elan ConnectTo = harburg1 #ConnectTo = vpn2 #ConnectTo = cgre #ConnectTo = Stockholm
ffhh/tinc-up
#!/bin/sh ip addr add dev $INTERFACE 10.112.1.1/12 broadcast 10.127.255.255 ip link set dev $INTERFACE up
ffhh/tinc-down
#!/bin/sh ip link set dev $INTERFACE down ip addr del 10.112.1.1 dev $INTERFACE
ffhh/hosts/vpn1
Address = vpn1.hamburg.freifunk.net Cipher=blowfish Compression=0 Digest=sha1 IndirectData=no Port = 656 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAKVI9lNEiJ3JVDuXhsLKdqhE+k14bCM8cYaAReNrzBSDODxuLm+pPKwo +7SgYW2/vAdnbFX689yKIs9inbQGNrakQQS/84pQ4TyN+H1dkhmxn5hweF/Ci3Qp UxzfjeVmeH2L+ecVOgWK10aoUhfVGvCVB3UpoCT6GrQwOa8gB5vfAgMBAAE= -----END RSA PUBLIC KEY-----
ffhh/hosts/elan
Address = elan.ainex.net Port = 656 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALHyO9nsCFXUSlvaBRHZX4DMFTg2xvVPx2Vhtv0NPKIFeSMRNJ1tfuTN ZhFGT0yUpl2QdCf6Xm6k6gMyEIMgeRSNDTRmm/rgli7EnCA1wEIc30BFP7MHkzx7 1oYD/jQxJIWCyjW3kH1Ui3WkZHws8rvpALcicFSBgvCk7QzYq09nAgMBAAE= -----END RSA PUBLIC KEY-----
ffhh/hosts/lok72
Address=lok72.hamburg.freifunk.net Cipher=blowfish Compression=0 Digest=sha1 IndirectData=yes Port=4300 TCPonly=yes -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALMToovRzWqY6WOYdzQNz9FX5FbLj062qTgdIuds8eevezsSxRT8mFFL s7j2nGw1rx9r54qouigJMMToP4hoSzq+wHHksQZoF9o3wrXfiRpQKdx0P5v3MERX CpbV+r+AdZGWdCnNBAr4VbI0z3/gbC/yCKaqCXsRZrjwEeCfCSd9AgMBAAE= -----END RSA PUBLIC KEY-----
ffhh/hosts/cgre
Address = cgre.ath.cx Port = 655 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAO19CddoFNDcmM8+WEv1AH6gDsexfLdd64puQlxqVbK9tfiBA2YCFD0X K+bizO6yqMBwoBBJ8QyUsruUx+tJYeWJSfmuHmqJV4yUKqxiz0JObkqw0yuexQfj hFUrj8XGFkJ/Q8sLJwr6W9CySK0BGDfQIArk/Zk1zOdU86UxHeupAgMBAAE= -----END RSA PUBLIC KEY-----
ffhh/hosts/Stockholm
Address=Stockholm.hamburg.freifunk.net Port=655 TCPOnly = yes -----BEGIN RSA PUBLIC KEY----- MIGJAoGBANa5DF+Rsyd35eSbVR2+3TpEpeWFuDDAlVKBh63cbB744l7hPZ4lBJLq lUugZ1Vg5PkpEB7teJ4g4jv6Dz3GI83KzQOqumbyYDesAvQdd9NNftsoSycApMPp c+DLPxypZKpFET4Qb2uKc9ywo8DR/MFeottJVqehGYVrPj3IEaT7AgMBAAE= -----END RSA PUBLIC KEY-----
ffhh/hosts/harburg1
Address = harburg1.dyndns.org Port = 655 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAM59z1BuR6duHoSMqAFVrMpRSSrK/AAz5HCAcySaLzKJHgHJkJ/mTpiO 5UR0U9+H2vhFfVqpzSyIgcNdqNJ+LMt8q1N38rSuxxaQ8nFxVzXxZwhjUgzzlo2H IRJDfnYT0cHtCFF2xvDPyOvGkiCfKMjQ4Yieb/bmssMMKIpGAAbPAgMBAAE= -----END RSA PUBLIC KEY-----
InterCity VPN (ffvpn)
ffvpn/tinc.conf
Name = hhvpn1 PrivateKeyFile = /etc/tinc/ffvpn/rsa_key.priv Mode = Switch PingTimeout = 30 #TCPOnly = yes Port = 655 Hostnames=yes BindToAddress = 62.206.27.20 ConnectTo = hhvpn2 ConnectTo = berlin1 ConnectTo = ffhallevpn1 ConnectTo = erfurt1 ConnectTo = leipzig1 ConnectTo = leipzig2 ConnectTo = aurich1 ConnectTo = wien1 ConnectTo = zagreb1 ConnectTo = augsburg1
ffvpn/tinc-up
#!/bin/sh ip addr add dev $INTERFACE 10.207.0.9/16 broadcast 10.207.255.255 ip link set dev $INTERFACE up iptables -A FORWARD -i ffhh -s 10.112.0.0/12 -o ffvpn -j ACCEPT # FF Hamburg -> FF Global
ffvpn/tinc-down
#!/bin/sh ip link set dev $INTERFACE down ip addr del 10.207.0.9 dev $INTERFACE iptables -D FORWARD -i ffhh -s 10.112.0.0/12 -o ffvpn -j ACCEPT
ffvpn/hosts/hhvpn1
Address = vpn1.hamburg.freifunk.net Port = 655 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAL5ld4OnWv52XD8q0MbfW+DLUe2lCaHLyf4XacwqOhjvS5RH+iAyPgIc BZJEtmKjW+FrPRLTtJVeptlLWGJr+EE2/G3fq0/AbQDhzIT7OnqCNGrMC1YzNOZm C8CVyiPwELdvBL+Z7j6Jq545/1zZ/H+z1EK6xuucjhwITFqMQrdxAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/berlin1
address = vpn-ic1.berlin.freifunk.net -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALfEgQh1Po7B5/IP57pZT0iRjY+8GVfGgkYB7dFIANk/iSWjThe9pERm x4GGx2NNoiNoDVdUtSz41oIc65bd651G01e2A1bnFQ9qRc9rZ/S91SqpO0+KheYw judU2Mc81XkKQ38e9rgtU/OvWOF1Hq2EOOork2cePsC8QRa9oAa5AgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/ffhallevpn1
address = vpn1.freifunk-halle.de address = 88.198.51.136 Port = 655 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALF/Wu4pe+f3dHeLYApHxUnOGUBzpNREUet6nDp80uWT/dph7h6Yqtz2 XMkifjDjSDnHPa1l1LwWFXkTKVQLH4lUrDuadXMU+BSEJWO36vg/A9E3AjbzoTA7 RY6Gzx+FOXqTGOtqzEPMLkBGTrslerpw9JzfCgLlxLLCXg8Tri8ZAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/erfurt1
address = t35thr.dyndns.org -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAMB63H0OfUEUPoWPbM3tCCHQm+N9f8z0GDc7+fk+/8x09CuW6xmpfdm6 vYrR6ceUsjRUhT/cIO6PhF3bUnaI7otAXHDSK4idvq99Z0miEvHWpJ9W0ZnbuUa4 UeBJP0yCZLL4su7IPpdBWToPrgBHy43CAEnwdEHkp5iKE7zFscaPAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/leipzig1
Address = vpn1.leipzig.freifunk.net -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAKL7eWHmD2Rn6IP7JlSWtkphokN785g8nccBmfcjbwEwiZv+EFaVoid/ 0dPfvHaX0GaQGOhpef3PVHEbIMuU8dD9+7WbXO3+hUSIAfHoIdGK7n8qFtzTpzqn HAWcgneIE+sZVZRKC0B3VyQ8XujHuLCrQYkjRmVzvbb4cSzE+YhxAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/leipzig2
Address = vpn2.leipzig.freifunk.net -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALf6n7zN7GDf50k4F1+JbOde/7WGKc8HtaCNyIV93PeSFz1IiGpf8Vnn 9xGl64X+5i07gH9l81Cx2/cgSqY3XYSTCVrCCaAJN5jnoQbubfQTojx/e0ZKDXeO WVtjm6Y+TcqBLJ2TRAxmtyc3VX5VBfU3N3yaYZv3G+RzKNFI1VX7AgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/aurich1
Address = 217.7.143.189 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAMTmDsazE1oEcjoMdiVtRtRyY1YX13DtK7O3sYdNMUjQA1Zn+OgDPRxm okwOAvT6ZqWr9xLmYWose3Vh7x4wuuNRuGaKgbB0bqWGWBlYeaqTTKGT9V/eJalj n3of5UZQkTDpYHd4RWNRbYKT69sLfR4/8gmp4EUbAPD4JRBrUGPvAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/wien1
Address = 213.129.230.186 Address = wien1.icvpn.funkfeuer.at Address = 193.239.188.20 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAJ6ORemNoaEZLgCCvbHU3j3DA4+kKyVvZFPIs63MMQvCneazLs9Jc/bM zmUo/TaApxHKIiLJU0TjbXGU/gT/ocSpmxgUGm66zwidYx+6HEOjAg0qnx5kuS/l dmjVMsPBtStau9OBo79jaBalM2+P+bR7wqugFOWn5E9cV7iUouGrAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/zagreb1
Address = dugave-wireless.dnsalias.net Subnet = 10.207.2.1 -----BEGIN RSA PUBLIC KEY----- MIGJAoGBAK+2pGmXfrTtp7vAPTwQgiTXTX7UH2QPiRMvBop2T6VzLHFCiHQW8PCs jhZz4un7It4+JFn9hh/Srs04Unmt7useYM0smAWc0BVRjCMI8tMnlq8jlNXJ5+Ii YMxEbo641maODYY40FYqBEXQ98wYpMHiCbeU+Vm/pfdK+qXBsY+HAgMBAAE= -----END RSA PUBLIC KEY-----
ffvpn/hosts/augsburg1
Address = augsburg1.ath.cx -----BEGIN RSA PUBLIC KEY----- MIGJAoGBALVQaY0axASCewZdfMPbxUBwphhoDHKzm0SvpietNy0gy+43Jb+N/Cs+ d9l9HlAS2ngrCAahVm/GRA3iYHH2i5JdZnzxPFKdkefcZFz7x0ZDaqeqpb2YLWFs z2LPm37OCcsi9NPZtvDG+0Nas370xDn/6uZhCd0gAplDuI+3m0vRAgMBAAE= -----END RSA PUBLIC KEY-----
Quagga
InterCity-VPN
bgpd.conf
! ! Zebra configuration saved from vty ! 2007/04/19 08:19:20 ! hostname bgpd@vpn1.hamburg.freifunk.net password 8 pophase enable password 8 blasehase log file /var/log/bgpd.log informational log syslog informational service advanced-vty service password-encryption banner motd file /etc/issue.net ! !debug bgp events ! bgp multiple-instance ! router bgp 65044 bgp router-id 10.207.0.9 bgp log-neighbor-changes bgp bestpath as-path confed network 10.4.2.0/24 network 10.112.0.0/13 network 10.120.0.0/14 network 10.124.0.0/15 network 10.126.0.0/16 neighbor ff-peers4 peer-group neighbor ff-peers4 update-source 10.207.0.9 neighbor ff-peers4 soft-reconfiguration inbound neighbor ff-peers4 prefix-list bgp4in in neighbor ff-peers4 prefix-list bgp4out out neighbor ff-peers6 peer-group neighbor ff-peers6 soft-reconfiguration inbound neighbor ff-peers6 prefix-list bgp6in in neighbor ff-peers6 prefix-list bgp6out out neighbor 10.207.0.1 remote-as 65041 neighbor 10.207.0.1 peer-group ff-peers4 neighbor 10.207.0.1 description Leipzig1 neighbor 10.207.0.2 remote-as 65041 neighbor 10.207.0.2 peer-group ff-peers4 neighbor 10.207.0.2 description Leipzig2 neighbor 10.207.0.3 remote-as 65042 neighbor 10.207.0.3 peer-group ff-peers4 neighbor 10.207.0.3 description Weimar1 neighbor 10.207.0.4 remote-as 65042 neighbor 10.207.0.4 peer-group ff-peers4 neighbor 10.207.0.4 description Weimar2 neighbor 10.207.0.5 remote-as 65040 neighbor 10.207.0.5 peer-group ff-peers4 neighbor 10.207.0.5 description Berlin1 neighbor 10.207.0.6 remote-as 65040 neighbor 10.207.0.6 peer-group ff-peers4 neighbor 10.207.0.6 description Berlin2 neighbor 10.207.0.7 remote-as 65043 neighbor 10.207.0.7 peer-group ff-peers4 neighbor 10.207.0.7 description Erfurt1 neighbor 10.207.0.8 remote-as 65043 neighbor 10.207.0.8 peer-group ff-peers4 neighbor 10.207.0.8 description Erfurt2 neighbor 10.207.0.11 remote-as 65045 neighbor 10.207.0.11 peer-group ff-peers4 neighbor 10.207.0.11 description Stuttgart1 neighbor 10.207.0.12 remote-as 65045 neighbor 10.207.0.12 peer-group ff-peers4 neighbor 10.207.0.12 description Stuttgart2 neighbor 10.207.0.13 remote-as 65046 neighbor 10.207.0.13 peer-group ff-peers4 neighbor 10.207.0.13 description Halle1 neighbor 10.207.0.14 remote-as 65046 neighbor 10.207.0.14 peer-group ff-peers4 neighbor 10.207.0.14 description Halle2 neighbor 10.207.0.15 remote-as 65047 neighbor 10.207.0.15 peer-group ff-peers4 neighbor 10.207.0.15 description Aurich1 neighbor 10.207.0.16 remote-as 65048 neighbor 10.207.0.16 peer-group ff-peers4 neighbor 10.207.0.16 description Chaos-Communication-Camp neighbor 10.207.0.17 remote-as 65050 neighbor 10.207.0.17 peer-group ff-peers4 neighbor 10.207.0.17 description Ausgburg1 neighbor 10.207.1.1 remote-as 35492 neighbor 10.207.1.1 peer-group ff-peers4 neighbor 10.207.1.1 description Wien1 neighbor 10.207.1.2 remote-as 35492 neighbor 10.207.1.2 peer-group ff-peers4 neighbor 10.207.1.2 description Wien2 neighbor 10.207.2.1 remote-as 65049 neighbor 10.207.2.1 peer-group ff-peers4 neighbor 10.207.2.1 description Zagreb1 neighbor 10.207.255.1 remote-as 65041 neighbor 10.207.255.1 peer-group ff-peers4 neighbor 10.207.255.1 description Leipzig-FOO distance bgp 150 150 150 ! address-family ipv6 network 2001:6f8:982::/48 network 2001:6f8:1300::/48 network 2001:4830:1739::/48 neighbor ff-peers6 activate neighbor ff-peers6 soft-reconfiguration inbound neighbor ff-peers6 prefix-list bgp6in in neighbor ff-peers6 prefix-list bgp6out out exit-address-family ! access-list access permit 127.0.0.1/32 access-list access permit 10.35.2.8/32 access-list access permit 10.35.3.0/24 access-list access permit 172.31.0.0/24 access-list access deny any ! ip prefix-list bgp4in description BGP IPv4 import filter ip prefix-list bgp4in seq 5 deny 0.0.0.0/8 le 32 ip prefix-list bgp4in seq 10 deny 6.0.0.0/8 le 32 ip prefix-list bgp4in seq 100 permit any ! ip prefix-list bgp4out description Out allowed routing announcements ip prefix-list bgp4out seq 10 permit 10.112.0.0/12 le 32 ip prefix-list bgp4out seq 20 permit 10.4.2.0/24 ip prefix-list bgp4out seq 99 deny any ! ipv6 access-list access permit ::1/128 ipv6 access-list access permit 2001:6f8:982::/48 ipv6 access-list access permit 2001:6f8:1300::/48 ipv6 access-list access permit 2001:4830:1739::/48 ipv6 access-list access deny any ! ipv6 prefix-list bgp6in description BGP IPv6 import filter ipv6 prefix-list bgp6in seq 5 deny ::/0 le 128 ! ipv6 prefix-list bgp6out description BGP IPv6 export filter ipv6 prefix-list bgp6out seq 10 permit 2001:6f8:982::/48 le 64 ipv6 prefix-list bgp6out seq 20 permit 2001:6f8:1300::/48 le 64 ipv6 prefix-list bgp6out seq 99 deny any ! line vty access-class access ipv6 access-class access ! end
Sonstiges
/etc/issue.net
,----------------------------------------------------------------------. | | | Unauthorized use of this system is prohibited and may be prosecuted | | to the fullest extent of law. By using this system, you implicitly | | agree to monitoring by system management and law enforcement | | authorities. If you do not agree with these terms, | | DISCONNECT NOW! | | ;-p | `----------------------------------------------------------------------^