Date: Tue, 20 Dec 2016 01:10:29 +0000 From: Joe Holden <mail@m.jwh.me.uk> To: freebsd-net@freebsd.org Subject: Re: Avoid using RFC3927 outside of the link Message-ID: <eb570498-d8a3-27d5-9fac-369d3902187a@m.jwh.me.uk> In-Reply-To: <20161219210150.mf4cwx3k33x2qbbe@kaiminus> References: <20161219184617.7yph7isgtgjy4mja@kaiminus> <58582C25.7090806@grosbein.net> <20161219190506.kc32q7sz3okekup7@kaiminus> <58583645.3090502@grosbein.net> <20161219210150.mf4cwx3k33x2qbbe@kaiminus>
next in thread | previous in thread | raw e-mail | index | archive | help
On 19/12/2016 21:01, Alarig Le Lay wrote: > On Tue Dec 20 02:34:29 2016, Eugene Grosbein wrote: >> Well, you can always use brute force instead: >> >> ipfw nat 169 config reset ip 89.234.186.1 && \ >> ipfw add 60 nat 169 ip from 169.254.0.0/16 to any out xmit igb0 >> >> That's ugly but works. > > I will work just by side effect: by doing this, I will send BGP packets > from 89.234.186.1, which is an IP than the peer learned by BGP. This will > create a recursive loop, and the session will be shut. So, no more > traffic will transit through this interface, and this IP will not be > displayed anymore :p > Use valid addressing and optionally, working config, there is no problem here.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?eb570498-d8a3-27d5-9fac-369d3902187a>