
336
C
HAPTER
35: IS-IS C
ONFIGURATION
n
■
For more information about route redistribution, refer to “IP Routing Policy
Configuration” on page 378.
■
The
allow-ibgp
keyword is used to redistribute iBGP routes. Because the
AS-PATH attribute of redistributed iBGP routes is discarded, routing loops may
occur. Therefore, use this keyword with caution.
Configuring Route
Filtering
IS-IS can filter received routes and advertised routes based on ACL numbers.
Configuring received route filtering
Configuring IS-IS to filter the routes advertised by other routing protocols
n
■
The
filter-policy import
command filters only the IS-IS routes received from
neighbors. The routes that cannot pass the filtering will not be added to the
routing table.
■
The
filter-policy export
command only applies to the routes imported with
the
import-route
command. The
filter-policy export
command will not
work if you do not configure the
import-route
command to import non-IS-IS
routes.
■
If you do not specify which type of routes are to be filtered with the
filter-policy export
command, all the routes imported with the
import-route
command will be filtered.
Table 258
Configure route redistribution
Operation Command
Description
Enter system view
system-view
-
Enter IS-IS view
isis
[
tag
] Required
Enable route
redistribution from
another routing protocol
import-route
protocol
[
allow-ibgp
] [
cost
value
|
type
{
external
|
internal
} | [
level-1
|
level-1-2
|
level-2
] |
route-policy
route-policy-name
]*
Optional
By default, no
route
redistribution is
configured.
Table 259
Configure received route filtering
Operation Command
Description
Enter system view
system-view
-
Enter IS-IS view
isis
[
tag
] Required
Set the policy for filtering
received routes
filter-policy
acl-number
import
Required
By default, IS-IS does not filter
received routes.
Table 260
Configure IS-IS to filter the routes advertised by other routing protocols
Operation Command
Description
Enter system view
system-view
-
Enter IS-IS view
isis
[
tag
] Required
Set the policy for
filtering the routes
advertised by other
protocols
filter-policy
acl-number
export
[
protocol
]
Optional
By default, IS-IS does not
receive the routes advertised
by other routing protocols.
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...