Controlling Route Distribution and Reception
385
Configuring BGP Route
Reception Filtering
Policies
Follow these steps to configure BGP route reception filtering policies:
n
■
Only routes permitted by the specified filtering policies can they be installed
into the local BGP routing table.
■
Members of a peer group can have different route reception filtering policies
from the peer group.
Configure the filtering of
outgoing redistributed routes
filter-policy
{
acl-number
|
ip-prefix
ip-prefix-name
}
export
[
direct | isis
process-id
| ospf
process-id
|
rip
process-id
| | static
]
Required to choose any;
Not configured by default;
You can configure a filtering
policy as needed;
If several filtering policies are
configured, they are applied
in the following sequence:
■
filter-policy export
■
peer filter-policy export
■
peer as-path-acl export
■
peer ip-prefix export
■
peer route-policy export
Only routes pass the first
policy, can they go to the
next, and only routes passing
all the configured policies, can
they be advertised.
Reference a routing policy to
filter routes to a peer/peer
group
peer
{
group-name
|
ip-address
}
route-policy
route-policy-name
export
Reference an ACL to filer
routes to a peer/peer group
peer
{
group-name
|
ip-address
}
filter-policy
acl-number
export
Reference an AS path ACL to
filter routing information to a
peer/peer group
peer
{
group-name
|
ip-address
}
as-path-acl
as-path-acl-number
export
Reference an IP prefix list to
filer routing information to a
peer/peer group
peer
{
group-name
|
ip-address
}
ip-prefix
ip-prefix-name
export
To do…
Use the command…
Remarks
To do…
Use the command…
Remarks
Enter system view
system-view
-
Enter BGP view
bgp
as-number
-
Filter incoming routes with an
ACL or IP prefix list
filter-policy
{
acl-number
|
ip-prefix
ip-prefix-name
}
import
Required to choose any;
No route reception filtering is
configured by default;
You can configure a filtering
policy as needed;
If several filtering policies are
configured, they are applied
in the following sequence:
■
filter-policy import
■
peer filter-policy import
■
peer as-path-acl import
■
peer ip-prefix import
■
peer route-policy import
Only routes passing the first
policy, can they go to the
next, and only routes passing
all the configured policies, can
they be received.
Reference a routing policy to
filter routes from a peer/peer
group
peer
{
group-name
|
ip-address
}
route-policy
policy-name
import
Reference an ACL to filter
routing information from a
peer/peer group
peer
{
group-name
|
ip-address
}
filter-policy
acl-number
import
Reference an AS path ACL to
filter routing information from
a peer/peer group
peer
{
group-name
|
ip-address
}
as-path-acl
as-path-acl-number
import
Reference an IP prefix list to
filter routing information from
a peer/peer group
peer
{
group-name
|
ip-address
}
ip-prefix
ip-prefix-name
import
Specify the maximum number
of routes that can be received
from a peer/peer group
peer
{
group-name
|
ip-address
}
route-limit
limit
[
percentage
]
The number is unlimited by
default.
Summary of Contents for 4800G Series
Page 26: ...26 CHAPTER NETWORKING APPLICATIONS ...
Page 30: ...30 CHAPTER 1 LOGGING IN TO AN ETHERNET SWITCH ...
Page 62: ...62 CHAPTER 3 LOGGING IN THROUGH TELNET ...
Page 70: ...70 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 72: ...72 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 82: ...82 CHAPTER 8 CONTROLLING LOGIN USERS ...
Page 98: ...98 CHAPTER 9 VLAN CONFIGURATION ...
Page 108: ...108 CHAPTER 10 VOICE VLAN CONFIGURATION ...
Page 119: ...GVRP Configuration Examples 119 DeviceB display vlan dynamic No dynamic vlans exist ...
Page 120: ...120 CHAPTER 11 GVRP CONFIGURATION ...
Page 160: ...160 CHAPTER 17 PORT ISOLATION CONFIGURATION ...
Page 172: ...172 CHAPTER 19 LINK AGGREGATION CONFIGURATION ...
Page 196: ...196 CHAPTER 22 DLDP CONFIGURATION ...
Page 240: ...240 CHAPTER 23 MSTP CONFIGURATION ...
Page 272: ...272 CHAPTER 27 RIP CONFIGURATION ...
Page 364: ...364 CHAPTER 29 IS IS CONFIGURATION ...
Page 426: ...426 CHAPTER 31 ROUTING POLICY CONFIGURATION ...
Page 442: ...442 CHAPTER 33 IPV6 RIPNG CONFIGURATION ...
Page 466: ...466 CHAPTER 35 IPV6 IS IS CONFIGURATION ...
Page 488: ...488 CHAPTER 36 IPV6 BGP CONFIGURATION ...
Page 498: ...498 CHAPTER 37 ROUTING POLICY CONFIGURATION ...
Page 540: ...540 CHAPTER 40 TUNNELING CONFIGURATION ...
Page 552: ...552 CHAPTER 41 MULTICAST OVERVIEW ...
Page 604: ...604 CHAPTER 43 MLD SNOOPING CONFIGURATION ...
Page 628: ...628 CHAPTER 46 IGMP CONFIGURATION ...
Page 700: ...700 CHAPTER 48 MSDP CONFIGURATION ...
Page 812: ...812 CHAPTER 57 DHCP SERVER CONFIGURATION ...
Page 822: ...822 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 834: ...834 CHAPTER 61 BOOTP CLIENT CONFIGURATION ...
Page 850: ...850 CHAPTER 63 IPV4 ACL CONFIGURATION ...
Page 856: ...856 CHAPTER 64 IPV6 ACL CONFIGURATION ...
Page 860: ...860 CHAPTER 65 QOS OVERVIEW ...
Page 868: ...868 CHAPTER 66 TRAFFIC CLASSIFICATION TP AND LR CONFIGURATION ...
Page 888: ...888 CHAPTER 69 PRIORITY MAPPING ...
Page 894: ...894 CHAPTER 71 TRAFFIC MIRRORING CONFIGURATION ...
Page 904: ...904 CHAPTER 72 PORT MIRRORING CONFIGURATION ...
Page 930: ...930 CHAPTER 74 UDP HELPER CONFIGURATION ...
Page 990: ...990 CHAPTER 79 FILE SYSTEM MANAGEMENT CONFIGURATION ...
Page 1000: ...1000 CHAPTER 80 FTP CONFIGURATION ...
Page 1020: ...1020 CHAPTER 82 INFORMATION CENTER CONFIGURATION ...
Page 1038: ...1038 CHAPTER 84 SYSTEM MAINTAINING AND DEBUGGING ...
Page 1046: ...1046 CHAPTER 85 DEVICE MANAGEMENT ...
Page 1129: ...SSH Client Configuration Examples 1129 SwitchB ...
Page 1130: ...1130 CHAPTER 88 SSH CONFIGURATION ...
Page 1160: ...1160 CHAPTER 90 RRPP CONFIGURATION ...
Page 1180: ...1180 CHAPTER 91 PORT SECURITY CONFIGURATION ...
Page 1192: ...1192 CHAPTER 92 LLDP CONFIGURATION ...
Page 1202: ...1202 CHAPTER 93 POE CONFIGURATION ...
Page 1218: ...1218 CHAPTER 96 HTTPS CONFIGURATION ...