1
0
Fork 0

Remove pbr leftover from bgp experiment

This commit is contained in:
clerie 2021-01-12 13:42:20 +01:00
parent b6caebc4ef
commit 5f95721f3d
4 changed files with 0 additions and 64 deletions

View File

@ -70,20 +70,6 @@
};
};
petabyte.policyrouting = {
enable = true;
rules6 = [
{ rule = "from all to fd00:152:152::/48 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from fd00:152:152::/48 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to fd00:152:152::/48 unreachable"; prio = 20000; }
];
rules4 = [
{ rule = "from all to 10.152.0.0/16 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from 10.152.0.0/16 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to 10.152.0.0/16 unreachable"; prio = 20000; }
];
};
clerie.gre-tunnel = {
enable = true;
ipv4 = {
@ -123,7 +109,6 @@
}
protocol kernel kernel_ospf6 {
kernel table 1000;
ipv6 {
table ospf6;
export filter {
@ -135,7 +120,6 @@
}
protocol kernel kernel_ospf4 {
kernel table 1000;
ipv4 {
table ospf4;
export filter {

View File

@ -122,20 +122,6 @@
};
};
petabyte.policyrouting = {
enable = true;
rules6 = [
{ rule = "from all to fd00:152:152::/48 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from fd00:152:152::/48 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to fd00:152:152::/48 unreachable"; prio = 20000; }
];
rules4 = [
{ rule = "from all to 10.152.0.0/16 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from 10.152.0.0/16 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to 10.152.0.0/16 unreachable"; prio = 20000; }
];
};
clerie.gre-tunnel = {
enable = true;
ipv4 = {
@ -165,7 +151,6 @@
}
protocol kernel kernel_ospf6 {
kernel table 1000;
ipv6 {
table ospf6;
export filter {
@ -177,7 +162,6 @@
}
protocol kernel kernel_ospf4 {
kernel table 1000;
ipv4 {
table ospf4;
export filter {

View File

@ -78,20 +78,6 @@
networking.firewall.allowedUDPPorts = [ 50128 51337 ];
petabyte.policyrouting = {
enable = true;
rules6 = [
{ rule = "from all to fd00:152:152::/48 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from fd00:152:152::/48 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to fd00:152:152::/48 unreachable"; prio = 20000; }
];
rules4 = [
{ rule = "from all to 10.152.0.0/16 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from 10.152.0.0/16 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to 10.152.0.0/16 unreachable"; prio = 20000; }
];
};
services.bird2.enable = true;
services.bird2.config = ''
router id ${ (lib.head config.networking.interfaces.lo.ipv4.addresses).address };
@ -120,7 +106,6 @@
}
protocol kernel kernel_ospf6 {
kernel table 1000;
ipv6 {
table ospf6;
export filter {
@ -132,7 +117,6 @@
}
protocol kernel kernel_ospf4 {
kernel table 1000;
ipv4 {
table ospf4;
export filter {

View File

@ -66,20 +66,6 @@
networking.firewall.allowedUDPPorts = [ 50138 51337 ];
petabyte.policyrouting = {
enable = true;
rules6 = [
{ rule = "from all to fd00:152:152::/48 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from fd00:152:152::/48 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to fd00:152:152::/48 unreachable"; prio = 20000; }
];
rules4 = [
{ rule = "from all to 10.152.0.0/16 lookup 1000"; prio = 10000; } # OSPF
{ rule = "from 10.152.0.0/16 lookup 2000"; prio = 10000; } # BGP
{ rule = "from all to 10.152.0.0/16 unreachable"; prio = 20000; }
];
};
services.bird2.enable = true;
services.bird2.config = ''
router id ${ (lib.head config.networking.interfaces.lo.ipv4.addresses).address };
@ -98,7 +84,6 @@
}
protocol kernel kernel_ospf6 {
kernel table 1000;
ipv6 {
table ospf6;
export filter {
@ -110,7 +95,6 @@
}
protocol kernel kernel_ospf4 {
kernel table 1000;
ipv4 {
table ospf4;
export filter {