71746a4eb338ab3f0e36879baaa40cbb017796b8
howto/vyos1.4.x.md
... | ... | @@ -354,37 +354,37 @@ set policy prefix-list6 DN42-Network-v6 rule 10 le '128' |
354 | 354 | set policy prefix-list6 DN42-Network-v6 rule 10 prefix 'fd00::/8' |
355 | 355 | |
356 | 356 | |
357 | - |
|
358 | - |
|
359 | 357 | ##Block prefixes within internal network range, then allow everything else within DN42, then block everything else. |
360 | 358 | set policy route-map Default-Peering rule 10 action 'deny' |
361 | 359 | set policy route-map Default-Peering rule 10 description 'Prevent IP Conflicts' |
362 | 360 | set policy route-map Default-Peering rule 10 match ip address prefix-list 'BlockIPConflicts' |
363 | 361 | set policy route-map Default-Peering rule 11 action 'deny' |
364 | 362 | set policy route-map Default-Peering rule 11 description 'Prevent IP Conflicts' |
365 | -set policy route-map Default-Peering rule 11 match ip address prefix-list6 'BlockIPConflicts-v6' |
|
363 | +set policy route-map Default-Peering rule 11 match ipv6 address prefix-list 'BlockIPConflicts-v6' |
|
366 | 364 | set policy route-map Default-Peering rule 20 action 'permit' |
367 | 365 | set policy route-map Default-Peering rule 20 description 'Allow DN42-Network' |
368 | -set policy route-map Default-Peering rule 20 match ip address prefix-list 'DN42-Network-Network' |
|
366 | +set policy route-map Default-Peering rule 20 match ip address prefix-list 'DN42-Network' |
|
369 | 367 | set policy route-map Default-Peering rule 21 action 'permit' |
370 | 368 | set policy route-map Default-Peering rule 21 description 'Allow DN42-Network' |
371 | -set policy route-map Default-Peering rule 21 match ip address prefix-list6 'DN42-Network-Network-v6' |
|
369 | +set policy route-map Default-Peering rule 21 match ipv6 address prefix-list 'DN42-Network-v6' |
|
372 | 370 | set policy route-map Default-Peering rule 99 action 'deny' |
373 | 371 | |
374 | 372 | |
375 | 373 | ##Apply the route-map on import/export |
376 | 374 | |
377 | -set protocols bgp neighbor x.x.x.x address-family ipv4-unicast route-map export 'Default-Peering' |
|
378 | -set protocols bgp neighbor x.x.x.x address-family ipv4-unicast route-map import 'Default-Peering' |
|
379 | -set protocols bgp neighbor x.x.x.x address-family ipv6-unicast route-map export 'Default-Peering' |
|
380 | -set protocols bgp neighbor x.x.x.x address-family ipv6-unicast route-map import 'Default-Peering' |
|
375 | +set protocols bgp peer-group dn42 address-family ipv4-unicast route-map export 'Default-Peering' |
|
376 | +set protocols bgp peer-group dn42 address-family ipv4-unicast route-map import 'Default-Peering' |
|
377 | +set protocols bgp peer-group dn42 address-family ipv6-unicast route-map export 'Default-Peering' |
|
378 | +set protocols bgp peer-group dn42 address-family ipv6-unicast route-map import 'Default-Peering' |
|
381 | 379 | ``` |
382 | 380 | |
383 | 381 | |
384 | 382 | # Add your VyOS router to the [Global Route Collector](/services/Route-Collector)! |
385 | 383 | ``` |
386 | -set protocols bgp neighbor fd42:4242:2601:ac12::1 address-family ipv4-unicast |
|
387 | -set protocols bgp neighbor fd42:4242:2601:ac12::1 address-family ipv6-unicast |
|
384 | +# The route collector should never export routes, so let's make a route-map to reject them if it does. |
|
385 | +set policy route-map Deny-All rule 1 action deny |
|
386 | +set protocols bgp neighbor fd42:4242:2601:ac12::1 address-family ipv4-unicast route-map import 'Deny-All' |
|
387 | +set protocols bgp neighbor fd42:4242:2601:ac12::1 address-family ipv6-unicast route-map import 'Deny-All' |
|
388 | 388 | set protocols bgp neighbor fd42:4242:2601:ac12::1 description 'https://lg.collector.dn42' |
389 | 389 | set protocols bgp neighbor fd42:4242:2601:ac12::1 ebgp-multihop '10' |
390 | 390 | set protocols bgp neighbor fd42:4242:2601:ac12::1 remote-as '4242422602' |