router id 62.168.0.1;
-define xyzzy = 120+10;
-
-filter testf
-int j;
-{
- print "Heya, filtering route to " rta.net.ip " prefixlen " rta.net.len;
- print "This route was from " rta.from;
- j = 7;
- j = 17;
- if rta.rip_metric > 15 then
- print "RIP Metric is more than infinity";
-
- accept;
-}
-
-protocol rip MyRIP_test {
- preference xyzzy;
- debug all;
- port 1520;
- period 5;
- garbagetime 30;
- interface "*" { mode broadcast; };
- export filter testf;
- honour neighbour;
- passwords { password "ahoj" from 0 to 10;
- password "nazdar" from 10;
- }
- authentication md5;
-}
+define xyzzy = (120+10);
protocol device {
-# disabled;
+ disabled;
# interface "eth*", "ppp*";
}
-#protocol kernel {
-# disabled;
+protocol direct {
+}
+
+protocol kernel {
+ disabled;
# learn; # Learn all routes from the kernel
# scan time 10; # Scan kernel tables every 10 seconds
-#}
+}
protocol static {
# disabled;
- route 0.0.0.0/0 via 62.168.0.13;
- route 62.168.0.0/25 reject;
-# route 10.0.0.0/8 reject;
+
+ route fec0:2::/64 blackhole;
+ route fec0:3::/64 unreachable;
+ route fec0:4::/64 prohibit;
+
+# route 0.0.0.0/0 via 195.113.31.113;
+# route 62.168.0.0/25 unreachable;
+# route 1.2.3.4/32 via 195.113.31.124;
+# route 10.0.0.0/8 unreachable;
# route 10.1.1.0:255.255.255.0 via 62.168.0.3;
# route 10.1.2.0:255.255.255.0 via 62.168.0.3;
# route 10.1.3.0:255.255.255.0 via 62.168.0.4;
# route 10.2.0.0/24 via "arc0";
+ export all;
+}
+
+protocol rip {
}