File: peers.map.example

package info (click to toggle)
pmacct 1.7.8-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 11,904 kB
  • sloc: ansic: 110,430; sh: 4,794; cpp: 4,375; python: 3,632; makefile: 525
file content (71 lines) | stat: -rw-r--r-- 3,452 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
! 
! bgp_peer_src_as_map: BGP source peer ASN map 
!
! File syntax is key-based. Read full syntax rules in 'pretag.map.example' in
! this same directory.
!
! nfacctd, sfacctd: valid keys: id, ip, in, bgp_nexthop, src_mac, vlan.
!
! pmacctd, uacctd: valid keys: id, ip, filter. 
!
! list of currently supported keys follow:
!
! 'id'			SET: value to assign to a matching packet or flow. Other
!			than hard-coded AS numbers, this field accepts also the
!			'bgp' keyword which triggers a BGP lookup and returns
!			its result: useful to handle exceptions.
! 'ip'                  MATCH: in nfacctd this is compared against the source
!                       IP address of the device originating NetFlow packets;
!                       in sfacctd this is compared against the AgentId field
!                       of received sFlow samples. Expected argument are an IP
!                       address or prefix (ie. XXX.XXX.XXX.XXX/NN). 0.0.0.0/0
!			would match all IPv4 addresses; ::/0 would match all
!			IPv6 addresses.
! 'in'                  MATCH: input interface
! 'bgp_nexthop'         MATCH: BGP next-hop of the flow source IP address (RPF-
!			like). This value is compared against the corresponding
!			BGP RIB of the exporting device.
! 'peer_dst_as'         MATCH: first AS hop within the AS-PATH of the source IP
!			address (RPF-like). This value is compared against the
!			BGP RIB of the exporting device (see 'bgp_daemon'
!			configuration directive).
! 'src_mac'             MATCH: In NetFlow v9 and IPFIX this is compared against
!                       IE #56, in sFlow against source MAC address field part
!                       of the Extended Switch object.
! 'vlan'                MATCH: In NetFlow v9 and IPFIX this is compared against
!                       IE #58, in sFlow against in/out VLAN ID fields part of
!                       the Extended Switch object.
! 'filter'		MATCH: incoming data is compared against the supplied
!			filter expression (expected in libpcap syntax); the
!			filter needs to be enclosed in quotes (').
!
! Examples:
!
! Private peering with AS12345 on router with IP address 192.168.2.1, SNMP ifIndex 7 
!
id=12345	ip=192.168.2.1	in=7

! A way to model a public internet exchange - in case MAC addresses are not available,
! ie. NetFlow v5. The catch-all entry at the end can be the AS number of the exchange.
! 'peer_dst_as' can be used instead of the BGP next-hop for the very same purpose, with
! perhaps 'peer_dst_as' being more effective in case of, say, egress NetFlow. Note that
! by using either 'bgp_nexthop' or 'peer_dst_as' for this purpose constitutes only an
! educated guess.
! 
id=34567	ip=192.168.1.1 	in=7	bgp_nexthop=10.10.10.1
id=45678	ip=192.168.1.1 	in=7	bgp_nexthop=10.10.10.2
id=56789	ip=192.168.1.1 	in=7

! A way to model a public internet exchange - in case MAC addresses are available. The
! method is exact and hence doesn't require a catch-all entry at the end.
! 
id=34567        ip=192.168.1.1  in=7    src_mac=00:01:02:03:04:05
id=45678        ip=192.168.1.1  in=7    src_mac=00:01:02:03:04:06

! Same example as the previous one but with pmacctd / uacctd:
id=34567        ip=0.0.0.0/0	filter='ether src 00:01:02:03:04:05'
id=45678        ip=0.0.0.0/0	filter='ether src 00:01:02:03:04:06'

! A simple example on how to trigger BGP lookups rather than returning a fixed result.
! This allows to handle exceptions to static mapping
id=bgp		ip=192.168.2.1  in=7