ffms.conf_dis 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. # This file is managed by ansible, don't make changes here - they will be overwritten.
  2. log syslog { debug, trace, info, remote, warning, error, auth, fatal, bug };
  3. router id 1;
  4. table ffnet;
  5. filter freifunk {
  6. if net ~ 2a03:2260:300a::/48 then accept;
  7. reject;
  8. }
  9. protocol kernel {
  10. scan time 20;
  11. import all;
  12. export all;
  13. table ffnet;
  14. kernel table 42;
  15. device routes;
  16. persist;
  17. };
  18. protocol radv {
  19. interface "bat01" {
  20. max ra interval 20;
  21. link mtu 1280;
  22. prefix 2a03:2260:300a:2000::/64 {
  23. };
  24. rdnss {
  25. ns 2a03:2260:300a:2000::1;
  26. };
  27. dnssl "ffdo";
  28. };
  29. interface "bat02" {
  30. max ra interval 20;
  31. link mtu 1280;
  32. prefix 2a03:2260:300a:2100::/64 {
  33. };
  34. rdnss {
  35. ns 2a03:2260:300a:2100::1;
  36. };
  37. dnssl "ffdo";
  38. };
  39. interface "bat03" {
  40. max ra interval 20;
  41. link mtu 1280;
  42. prefix 2a03:2260:300a:2200::/64 {
  43. };
  44. rdnss {
  45. ns 2a03:2260:300a:2200::1;
  46. };
  47. dnssl "ffdo";
  48. };
  49. interface "bat04" {
  50. max ra interval 20;
  51. link mtu 1280;
  52. prefix 2a03:2260:300a:2300::/64 {
  53. };
  54. rdnss {
  55. ns 2a03:2260:300a:2300::1;
  56. };
  57. dnssl "ffdo";
  58. };
  59. interface "bat05" {
  60. max ra interval 20;
  61. link mtu 1280;
  62. prefix 2a03:2260:300a:2400::/64 {
  63. };
  64. rdnss {
  65. ns 2a03:2260:300a:2400::1;
  66. };
  67. dnssl "ffdo";
  68. };
  69. interface "bat06" {
  70. max ra interval 20;
  71. link mtu 1280;
  72. prefix 2a03:2260:300a:2500::/64 {
  73. };
  74. rdnss {
  75. ns 2a03:2260:300a:2500::1;
  76. };
  77. dnssl "ffdo";
  78. };
  79. interface "bat07" {
  80. max ra interval 20;
  81. link mtu 1280;
  82. prefix 2a03:2260:300a:2600::/64 {
  83. };
  84. rdnss {
  85. ns 2a03:2260:300a:2600::1;
  86. };
  87. dnssl "ffdo";
  88. };
  89. interface "bat08" {
  90. max ra interval 20;
  91. link mtu 1280;
  92. prefix 2a03:2260:300a:2700::/64 {
  93. };
  94. rdnss {
  95. ns 2a03:2260:300a:2700::1;
  96. };
  97. dnssl "ffdo";
  98. };
  99. interface "bat09" {
  100. max ra interval 20;
  101. link mtu 1280;
  102. prefix 2a03:2260:300a:2800::/64 {
  103. };
  104. rdnss {
  105. ns 2a03:2260:300a:2800::1;
  106. };
  107. dnssl "ffdo";
  108. };
  109. interface "bat10" {
  110. max ra interval 20;
  111. link mtu 1280;
  112. prefix 2a03:2260:300a:2900::/64 {
  113. };
  114. rdnss {
  115. ns 2a03:2260:300a:2900::1;
  116. };
  117. dnssl "ffdo";
  118. };
  119. interface "bat11" {
  120. max ra interval 20;
  121. link mtu 1280;
  122. prefix 2a03:2260:300a:2a00::/64 {
  123. };
  124. rdnss {
  125. ns 2a03:2260:300a:2a00::1;
  126. };
  127. dnssl "ffdo";
  128. };
  129. };
  130. protocol bfd {
  131. table ffnet;
  132. interface "gre*";
  133. interface "bck*";
  134. multihop {
  135. passive;
  136. };
  137. };
  138. protocol device {
  139. scan time 10;
  140. };
  141. protocol ospf {
  142. table ffnet;
  143. import filter freifunk;
  144. export all;
  145. area 0.0.0.0 {
  146. interface "bat*" {
  147. stub;
  148. };
  149. interface "bck-*";
  150. interface "lo" {
  151. stub;
  152. };
  153. };
  154. };
  155. function is_default() {
  156. return (net ~ [::/0]);
  157. };
  158. filter export_to_upstream_filter {
  159. if source = RTS_STATIC then accept;
  160. reject;
  161. };
  162. protocol static static_Gesamtnetzwerk {
  163. table ffnet;
  164. route 2a03:2260:300a::/48 reject;
  165. };
  166. protocol static static_domaene01 {
  167. table ffnet;
  168. route 2a03:2260:300a:2000::/56 reject;
  169. };
  170. protocol static static_domaene02 {
  171. table ffnet;
  172. route 2a03:2260:300a:2100::/56 reject;
  173. };
  174. protocol static static_domaene03 {
  175. table ffnet;
  176. route 2a03:2260:300a:2200::/56 reject;
  177. };
  178. protocol static static_domaene04 {
  179. table ffnet;
  180. route 2a03:2260:300a:2300::/56 reject;
  181. };
  182. protocol static static_domaene05 {
  183. table ffnet;
  184. route 2a03:2260:300a:2400::/56 reject;
  185. };
  186. protocol static static_domaene06 {
  187. table ffnet;
  188. route 2a03:2260:300a:2500::/56 reject;
  189. };
  190. protocol static static_domaene07 {
  191. table ffnet;
  192. route 2a03:2260:300a:2600::/56 reject;
  193. };
  194. protocol static static_domaene08 {
  195. table ffnet;
  196. route 2a03:2260:300a:2700::/56 reject;
  197. };
  198. protocol static static_domaene09 {
  199. table ffnet;
  200. route 2a03:2260:300a:2800::/56 reject;
  201. };
  202. protocol static static_domaene10 {
  203. table ffnet;
  204. route 2a03:2260:300a:2900::/56 reject;
  205. };
  206. protocol static static_domaene11 {
  207. table ffnet;
  208. route 2a03:2260:300a:2a00::/56 reject;
  209. };
  210. protocol kernel 'kernel_master' {
  211. scan time 20;
  212. table master;
  213. kernel table 254;
  214. import all;
  215. export all;
  216. persist;
  217. };
  218. protocol static {
  219. table master;
  220. import all;
  221. export none;
  222. };
  223. protocol direct {
  224. interface "lo";
  225. interface "tun-ffrl*";
  226. interface "gre-*";
  227. interface "bck-*";
  228. interface "bat*";
  229. table ffnet;
  230. }
  231. template bgp internal {
  232. table ffnet;
  233. local as 65403;
  234. import filter {
  235. if is_default() then
  236. preference = 99;
  237. else
  238. preference = 160;
  239. accept;
  240. };
  241. export filter {
  242. if source = RTS_BGP then accept;
  243. else reject;
  244. };
  245. gateway direct;
  246. direct;
  247. next hop self;
  248. };
  249. protocol bgp ibgp_sn_dev2 from internal {
  250. neighbor 2a03:2260:115:ffa1::1:2:0 as 65403;
  251. }
  252. template bgp uplink {
  253. table ffnet;
  254. local as 65403;
  255. import where is_default();
  256. export filter export_to_upstream_filter;
  257. gateway recursive;
  258. }
  259. protocol bgp ffrl_dus from uplink {
  260. description "Rheinland Backbone";
  261. source address 2a03:2260:0:3f::2;
  262. neighbor 2a03:2260:0:3f::1 as 201701;
  263. };
  264. protocol bgp ffrl_fra from uplink {
  265. description "Rheinland Backbone";
  266. source address 2a03:2260:0:3e::2;
  267. neighbor 2a03:2260:0:3e::1 as 201701;
  268. };