Source code pulled from OpenBSD for OpenNTPD. The place to contribute to this code is via the OpenBSD CVS tree.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

91 lines
1.9 KiB

  1. # $OpenBSD: bgpd.conf,v 1.7 2004/10/01 15:12:16 henning Exp $
  2. # sample bgpd configuration file
  3. # see bgpd.conf(5)
  4. #macros
  5. peer1="10.1.0.2"
  6. peer2="10.1.0.3"
  7. # global configuration
  8. AS 65001
  9. router-id 10.0.0.1
  10. # holdtime 180
  11. # holdtime min 3
  12. # listen on 127.0.0.1
  13. # listen on ::1
  14. # fib-update no
  15. # route-collector no
  16. # log updates
  17. # network 10.0.1.0/24
  18. # neighbors and peers
  19. group "peering AS65002" {
  20. remote-as 65002
  21. neighbor $peer1 {
  22. descr "AS 65001 peer 1"
  23. announce self
  24. tcp md5sig password mekmitasdigoat
  25. }
  26. neighbor $peer2 {
  27. descr "AS 65001 peer 2"
  28. announce all
  29. local-address 10.0.0.8
  30. ipsec esp ike
  31. }
  32. }
  33. group "peering AS65042" {
  34. descr "peering AS 65042"
  35. local-address 10.0.0.8
  36. ipsec ah ike
  37. neighbor 10.2.0.1
  38. neighbor 10.2.0.2
  39. }
  40. neighbor 10.0.1.0 {
  41. remote-as 65003
  42. descr upstream
  43. multihop 2
  44. local-address 10.0.0.8
  45. passive
  46. holdtime 180
  47. holdtime min 3
  48. announce none
  49. tcp md5sig key deadbeef
  50. }
  51. neighbor 10.0.2.0 {
  52. remote-as 65004
  53. descr upstream2
  54. local-address 10.0.0.8
  55. ipsec ah ike
  56. }
  57. neighbor 10.0.0.0/24 {
  58. descr "template for local peers"
  59. }
  60. neighbor 10.2.1.1 {
  61. remote-as 65023
  62. local-address 10.0.0.8
  63. ipsec esp in spi 10 sha1 0a4f1d1f1a1c4f3c9e2f6f0f2a8e9c8c5a1b0b3b \
  64. aes 0c1b3a6c7d7a8d2e0e7b4f3d5e8e6c1e
  65. ipsec esp out spi 12 sha1 0e9c8f6a8e2c7d3a0b5d0d0f0a3c5c1d2b8e0f8b \
  66. aes 4e0f2f1b5c4e3c0d0e2f2d3b8c5c8f0b
  67. }
  68. # filter out prefixes longer than 24 or shorter than 8 bits
  69. deny from any
  70. allow from any prefixlen 8 - 24
  71. # do not accept a default route
  72. deny from any prefix 0.0.0.0/0
  73. # filter bogus networks
  74. deny from any prefix 10.0.0.0/8 prefixlen >= 8
  75. deny from any prefix 172.16.0.0/12 prefixlen >= 12
  76. deny from any prefix 192.168.0.0/16 prefixlen >= 16
  77. deny from any prefix 169.254.0.0/16 prefixlen >= 16
  78. deny from any prefix 192.0.2.0/24 prefixlen >= 24
  79. deny from any prefix 224.0.0.0/4 prefixlen >= 4
  80. deny from any prefix 240.0.0.0/4 prefixlen >= 4