Claudio and crew,

Unsure if this is a bug or intended. I was testing BGP triggered
blackholes, one of the routers that will perform the blackhole has
this rule in its bgpd.conf:

match from group GROUP-IBGP community 1234:666 set { localpref 200
origin igp nexthop blackhole }


Looking exclusively at the bgpctl output makes it appear to be not
working (186.4.134.249 is a blocked source, 10.171.0.66 is the router
triggering the blackhole, it should NOT be the nexthop):

# bgpctl show ip bgp detail 186.4.134.249

BGP routing table entry for 186.4.134.249/32
    Nexthop 10.171.0.66 (via 10.171.7.166) from rr1 (10.171.0.16)
    Origin IGP, metric 0, localpref 200, internal, valid, best
    Last update: 00:01:42 ago
    Communities: 1239:66 3356:9999 4150:666 NO_EXPORT
    Originator Id: 10.171.0.66
    Cluster ID List: 10.171.0.16


When you look at the actual routing table though, it is blackholed and
is functioning properly:

# netstat -nr | grep 186.4.134.249
186.4.134.249/32   127.0.0.1          UGB        0       14 33160    48 lo0


Is this intended behavior?

Thanks,
Chris

Reply via email to