[prev in list] [next in list] [prev in thread] [next in thread]
List: bird-users
Subject: Re: Testing release
From: Gustavo Ponza <g.ponza () tin ! it>
Date: 2014-11-08 10:56:13
Message-ID: 1415444173.2309.49.camel () ubuntu
[Download RAW message or body]
Hi Ondrej,
a first question: I don't know if is possible to inject
through the 'ppp' interface (linux -> Mikrotik)
the following routes/prefixes, since they remain sit on the
linux kernel, and not propagated, although are recognized
by the BIRD as follows:
root@ir0rm-7:/home/i0ojj# birdc
BIRD 1.5.0pre ready.
bird> sh route
0.0.0.0/0 via 192.168.1.1 on eth0 [kernel1 23:38:02] * (10)
44.135.48.0/24 via 173.179.100.113 on tunl0 [kernel1 10:05:11] *
(10)
44.135.49.0/27 via 76.28.121.159 on tunl0 [kernel1 10:05:11] * (10)
44.4.50.3/32 via 38.99.34.76 on tunl0 [kernel1 10:05:11] * (10)
44.135.50.0/26 via 206.80.251.222 on tunl0 [kernel1 10:05:11] * (10)
10.26.241.100/30 via 10.58.2.3 on ppp0 [ospf1 23:38:17] * I (150/30)
[8.13.154.136]
44.135.83.24/32 via 24.55.196.48 on tunl0 [kernel1 10:05:11] * (10)
44.42.128.0/24 via 65.7.249.190 on tunl0 [kernel1 10:05:11] * (10)
44.134.48.0/24 via 95.228.227.225 on tunl0 [kernel1 10:05:11] * (10)
44.135.52.0/24 via 132.213.22.244 on tunl0 [kernel1 10:05:11] * (10)
44.133.8.13/32 via 80.37.63.33 on tunl0 [kernel1 10:05:11] * (10)
44.137.24.5/32 via 89.18.172.156 on tunl0 [kernel1 10:05:11] * (10)
44.154.64.0/24 via 37.6.202.94 on tunl0 [kernel1 10:05:11] * (10)
44.178.224.0/24 via 188.93.56.29 on tunl0 [kernel1 10:05:11] * (10)
44.74.0.128/28 via 98.24.18.197 on tunl0 [kernel1 10:05:11] * (10)
44.136.9.0/24 via 110.175.8.109 on tunl0 [kernel1 10:05:11] * (10)
44.4.50.2/32 via 199.103.53.117 on tunl0 [kernel1 10:05:11] * (10)
<snip>
and so displayed in linux machine by the 'route' command:
root@ir0rm-7:/home/i0ojj# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
44.46.0.11 199.187.163.73 255.255.255.255 UGH 0 0 0
tunl0
44.153.54.20 190.1.38.237 255.255.255.255 UGH 0 0 0
tunl0
44.46.0.12 207.119.186.111 255.255.255.255 UGH 0 0 0
tunl0
44.153.54.21 190.97.49.15 255.255.255.255 UGH 0 0 0
tunl0
44.153.54.22 190.97.49.15 255.255.255.255 UGH 0 0 0
tunl0
44.153.54.23 190.97.49.15 255.255.255.255 UGH 0 0 0
tunl0
44.151.6.9 87.106.152.158 255.255.255.255 UGH 0 0 0
tunl0
44.38.64.1 74.183.193.166 255.255.255.255 UGH 0 0 0
tunl0
<snip>
That routes are collected by a non-standard RIPv2 client, via the
'tunl0' interface, from a remote RIPv2 server, with the RIP protocol
modified and so *not* compatible with the standard RIPv2.
The second question is: having an 'openvpn' tunnel and so a 'tap0'
interface if I want stop the OSPF (namely, don't receive and don't
transit anything) is the following the right setup?
interface "tap0" {
stub;
};
Very thanks!
gus
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic