-
Notifications
You must be signed in to change notification settings - Fork 264
/
peers.map.example
71 lines (67 loc) · 3.37 KB
/
peers.map.example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
!
! bgp_peer_src_as_map: BGP source peer ASN map
!
! File syntax is key-based. Read full syntax rules in 'pretag.map.example' in
! this same directory.
!
! nfacctd, sfacctd: valid keys: id, ip, in, bgp_nexthop, src_mac, vlan.
!
! pmacctd, uacctd: valid keys: id, ip, filter.
!
! list of currently supported keys follow:
!
! 'id' SET: value to assign to a matching packet or flow. Other
! than hard-coded AS numbers, this field accepts also the
! 'bgp' keyword which triggers a BGP lookup and returns
! its result: useful to handle exceptions.
! 'ip' MATCH: in nfacctd this is compared against the source
! IP address of the device originating NetFlow packets;
! in sfacctd this is compared against the AgentId field
! of received sFlow samples. Expected argument are an IP
! address or prefix (ie. XXX.XXX.XXX.XXX/NN). 0.0.0.0/0
! would match all IPv4 addresses; ::/0 would match all
! IPv6 addresses.
! 'in' MATCH: input interface
! 'bgp_nexthop' MATCH: BGP next-hop of the flow source IP address (RPF-
! like). This value is compared against the corresponding
! BGP RIB of the exporting device.
! 'peer_dst_as' MATCH: first AS hop within the AS-PATH of the source IP
! address (RPF-like). This value is compared against the
! BGP RIB of the exporting device (see 'bgp_daemon'
! configuration directive).
! 'src_mac' MATCH: In NetFlow v9 and IPFIX this is compared against
! IE #56, in sFlow against source MAC address field part
! of the Extended Switch object.
! 'vlan' MATCH: In NetFlow v9 and IPFIX this is compared against
! IE #58, in sFlow against in/out VLAN ID fields part of
! the Extended Switch object.
! 'filter' MATCH: incoming data is compared against the supplied
! filter expression (expected in libpcap syntax); the
! filter needs to be enclosed in quotes (').
!
! Examples:
!
! Private peering with AS12345 on router with IP address 192.168.2.1, SNMP ifIndex 7
!
id=12345 ip=192.168.2.1 in=7
! A way to model a public internet exchange - in case MAC addresses are not available,
! ie. NetFlow v5. The catch-all entry at the end can be the AS number of the exchange.
! 'peer_dst_as' can be used instead of the BGP next-hop for the very same purpose, with
! perhaps 'peer_dst_as' being more effective in case of, say, egress NetFlow. Note that
! by using either 'bgp_nexthop' or 'peer_dst_as' for this purpose constitutes only an
! educated guess.
!
id=34567 ip=192.168.1.1 in=7 bgp_nexthop=10.10.10.1
id=45678 ip=192.168.1.1 in=7 bgp_nexthop=10.10.10.2
id=56789 ip=192.168.1.1 in=7
! A way to model a public internet exchange - in case MAC addresses are available. The
! method is exact and hence doesn't require a catch-all entry at the end.
!
id=34567 ip=192.168.1.1 in=7 src_mac=00:01:02:03:04:05
id=45678 ip=192.168.1.1 in=7 src_mac=00:01:02:03:04:06
! Same example as the previous one but with pmacctd / uacctd:
id=34567 ip=0.0.0.0/0 filter='ether src 00:01:02:03:04:05'
id=45678 ip=0.0.0.0/0 filter='ether src 00:01:02:03:04:06'
! A simple example on how to trigger BGP lookups rather than returning a fixed result.
! This allows to handle exceptions to static mapping
id=bgp ip=192.168.2.1 in=7