d3702d57fd
try to process authentication blocks as datablocks, make it possible to add data at end of packet. Password authentication should actually work.
59 lines
1.1 KiB
Text
59 lines
1.1 KiB
Text
/*
|
|
* This is an example configuration file.
|
|
*/
|
|
|
|
# Yet another comment
|
|
|
|
router id 62.168.0.1;
|
|
|
|
define xyzzy = 120+10;
|
|
|
|
filter testf
|
|
int j;
|
|
{
|
|
print "Heya, filtering route to " rta.net.ip " prefixlen " rta.net.len;
|
|
print "This route was from " rta.from;
|
|
j = 7;
|
|
j = 17;
|
|
if rta.rip_metric > 15 then
|
|
print "RIP Metric is more than infinity";
|
|
|
|
accept;
|
|
}
|
|
|
|
protocol rip MyRIP_test {
|
|
preference xyzzy;
|
|
debug all;
|
|
port 1520;
|
|
period 5;
|
|
garbagetime 30;
|
|
interface "*" { mode broadcast; };
|
|
export filter testf;
|
|
honour neighbour;
|
|
passwords { password "ahoj" from 0 to 10;
|
|
password "nazdar" from 10;
|
|
}
|
|
authentication plaintext;
|
|
}
|
|
|
|
protocol device {
|
|
# disabled;
|
|
# interface "eth*", "ppp*";
|
|
}
|
|
|
|
#protocol kernel {
|
|
# disabled;
|
|
# learn; # Learn all routes from the kernel
|
|
# scan time 10; # Scan kernel tables every 10 seconds
|
|
#}
|
|
|
|
protocol static {
|
|
# disabled;
|
|
route 0.0.0.0/0 via 62.168.0.13;
|
|
route 62.168.0.0/25 reject;
|
|
# route 10.0.0.0/8 reject;
|
|
# route 10.1.1.0:255.255.255.0 via 62.168.0.3;
|
|
# route 10.1.2.0:255.255.255.0 via 62.168.0.3;
|
|
# route 10.1.3.0:255.255.255.0 via 62.168.0.4;
|
|
# route 10.2.0.0/24 via "arc0";
|
|
}
|