EasyManua.ls Logo

3Com Switch 4800G 24-Port - Page 385

3Com Switch 4800G 24-Port
1246 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Controlling Route Distribution and Reception 385
Configuring BGP Route
Reception Filtering
Policies
Follow these steps to configure BGP route reception filtering policies:
n
Only routes permitted by the specified filtering policies can they be installed
into the local BGP routing table.
Members of a peer group can have different route reception filtering policies
from the peer group.
Configure the filtering of
outgoing redistributed routes
filter-policy { acl-number |
ip-prefix ip-prefix-name }
export [ direct | isis
process-id | ospf process-id |
rip process-id | | static ]
Required to choose any;
Not configured by default;
You can configure a filtering
policy as needed;
If several filtering policies are
configured, they are applied
in the following sequence:
filter-policy export
peer filter-policy export
peer as-path-acl export
peer ip-prefix export
peer route-policy export
Only routes pass the first
policy, can they go to the
next, and only routes passing
all the configured policies, can
they be advertised.
Reference a routing policy to
filter routes to a peer/peer
group
peer { group-name |
ip-address } route-policy
route-policy-name export
Reference an ACL to filer
routes to a peer/peer group
peer { group-name |
ip-address } filter-policy
acl-number export
Reference an AS path ACL to
filter routing information to a
peer/peer group
peer { group-name |
ip-address } as-path-acl
as-path-acl-number export
Reference an IP prefix list to
filer routing information to a
peer/peer group
peer { group-name |
ip-address } ip-prefix
ip-prefix-name export
To do… Use the command… Remarks
To do… Use the command… Remarks
Enter system view system-view -
Enter BGP view bgp as-number -
Filter incoming routes with an
ACL or IP prefix list
filter-policy { acl-number |
ip-prefix ip-prefix-name }
import
Required to choose any;
No route reception filtering is
configured by default;
You can configure a filtering
policy as needed;
If several filtering policies are
configured, they are applied
in the following sequence:
filter-policy import
peer filter-policy import
peer as-path-acl import
peer ip-prefix import
peer route-policy import
Only routes passing the first
policy, can they go to the
next, and only routes passing
all the configured policies, can
they be received.
Reference a routing policy to
filter routes from a peer/peer
group
peer { group-name |
ip-address } route-policy
policy-name import
Reference an ACL to filter
routing information from a
peer/peer group
peer { group-name |
ip-address } filter-policy
acl-number import
Reference an AS path ACL to
filter routing information from
a peer/peer group
peer { group-name |
ip-address } as-path-acl
as-path-acl-number import
Reference an IP prefix list to
filter routing information from
a peer/peer group
peer { group-name |
ip-address } ip-prefix
ip-prefix-name import
Specify the maximum number
of routes that can be received
from a peer/peer group
peer { group-name |
ip-address } route-limit limit
[ percentage ]
The number is unlimited by
default.

Table of Contents

Related product manuals