140
Examples
# Use IP prefix list
my-prefix-list
to filter inbound Type-3 LSAs, and use ACL 2000 to filter outbound
Type-3 LSAs in OSPF Area 1.
<Sysname> system-view
[Sysname] ospf 100
[Sysname-ospf-100] area 1
[Sysname-ospf-100-area-0.0.0.1] filter prefix-list my-prefix-list import
[Sysname-ospf-100-area-0.0.0.1] filter 2000 export
filter-policy export (OSPF view)
Use
filter-policy export
to configure OSPF to filter redistributed routes.
Use
undo filter-policy export
to remove the configuration.
Syntax
filter-policy
{
acl-number
|
prefix-list
prefix-list-name
}
export
[
protocol
[
process-id
] ]
undo filter-policy export
[
protocol
[
process-id
] ]
Default
Redistributed routes are not filtered.
Views
OSPF view
Predefined user roles
network-admin
Parameters
acl-number
: Specifies an ACL by its number in the range of 2000 to 3999 to filter redistributed routes by
destination address.
prefix-list-name
: Specifies an IP prefix list by its name, a case-sensitive string of 1 to 63 characters, to filter
redistributed routes by destination address.
protocol
: Filters routes redistributed from the specified routing protocol, which can be
bgp
,
direct
,
isis
,
ospf
,
rip
, or
static
. If no protocol is specified, this command filters all redistributed routes.
process-id
: Specifies a process by its ID in the range of 1 to 65535. This argument is available only when
the
protocol
is
rip
,
ospf
or
isis
.
Usage guidelines
To reference an advanced ACL (with a number from 3000 to 3999) in the command, configure the ACL
using one of the following methods:
•
To deny/permit a route with the specified destination, use the
rule
[
rule-id
] {
deny
|
permit
}
ip
source
sour-addr sour-wildcard
command.
•
To deny/permit a route with the specified destination and mask, use the
rule
[
rule-id
] {
deny
|
permit
}
ip source
sour-addr sour-wildcard
destination
dest-addr dest-wildcard
command.
The
source
keyword specifies the destination address of a route and the
destination
keyword specifies the
subnet mask of the route. The specified subnet mask must be contiguous. Otherwise, the mask
configuration does not take effect.