Le mar. 6 nov. 2018 à 14:56, Gregory Edigarov <[email protected]> a écrit :
>
> Hello, just noticed that.
>
> in pf.conf:
>
> table bgp-spamd-block persists
>
>
> in bgpd.conf
>
> spamdAS="65066"
> AS 65077
> fib-update no    # Mandatory, to not update the local routing table
> #log updates
>
> group "spamd-bgp" {
>          remote-as $spamdAS
>          multihop 64
>          export none     # Do not send Route Server any information
>
>          # us.bgp-spamd.net
>          neighbor 64.142.121.62
>
>          # eu.bgp-spamd.net
>          neighbor 217.31.80.170
>
>          # IPv6 eu.bgp-spamd.net
>          # neighbor 2a00:15a8:0:100:0:d91f:50aa:1
> }
>
> match from group spamd-bgp community $spamdAS:666  set pftable
> "bgp-spamd-block"
>
> bgpd is running
>
> some time later:
>
> lbld12# bgpctl sh
> Neighbor                   AS    MsgRcvd    MsgSent  OutQ Up/Down
> State/PrfRcvd
> 217.31.80.170           65066         78         20     0 00:08:53  38256
> 64.142.121.62           65066         76         20     0 00:08:53  38256
>
> i.e. it receives the prefixes ok, but:
>
> lbld12# pfctl -Tsh -t bgp-spamd-block | wc -l
>         0
what does 'bgpctl show nexthop' gives? On this kind of setup you might
need 'nexthop qualify via default' for nexthops to be validated and
prefixes to be accepted in pf tables.

Reply via email to