host1(config-router)#
neighbor 10.2.2.4 route-map 1 in
host1(config-router)#
exit
host1(config-router)#
neighbor 10.5.5.2 remote-as 32
host1(config-router)#
neighbor 10.5.5.2 weight 50
host1(config-router)#
neighbor 10.5.5.2 route-map 2 in
host1(config)#
route-map 1 permit 1
host1(config-route-map)#
match as-path 1
host1(config-route-map)#
set weight 25
host1(config-route-map)#
exit
host1(config)#
ip as-path access-list 1 permit [ 32 837 ]
host1(config)#
route-map 2 permit 1
host1(config-route-map)#
match as-path 2
host1(config-route-map)#
set weight 175
host1(config-route-map)#
exit
host1(config)#
ip as-path access-list 2 permit [ 74 ]
The result of this configuration is that router Chicago prefers routes learned through
router Boston (weight 150) over routes learned through router NY (weight 50), except
that:
■
Router Chicago prefers routes learned via router NY that passed through AS 837
or AS 32 (weight 50) over the same routes learned via router Boston (weight 25
according to route map 1).
■
Router Chicago prefers routes originating in AS 74 learned via router NY that
passed through AS 837 and AS 32 (weight 175 according to route map 2) over
the same routes learned via router Boston (weight 150).
access-list
■
Use to define an IP access list to permit or deny routes based on the prefix.
■
Each access list is a set of permit or deny conditions for routes based on matching
a route's prefix.
■
A zero in the wildcard mask means that the corresponding bit in the address
must be exactly matched by the route. A one in the wildcard mask means that
the corresponding bit in the address does not have to be matched by the route.
■
Use the
neighbor distribute-list
command to apply the access list to routes
received from or forwarded to a neighbor.
■
Use the
log
keyword to log an Info event in the ipAccessList log whenever an
access list rule is matched.
■
Example
host1(config)#
access-list bronze permit ip host any 228.0.0.0 0.0.0.255
■
Use the
no
version to delete an IP access list (no other options specified), the
specified entry in the access list, or the log for the specified access list or entry
(by specifying the
log
keyword).
■
See access-list.
default-information originate
26
■
Access Lists
JUNOSe 11.0.x IP Services Configuration Guide
Содержание JUNOSE 11.0.X IP SERVICES
Страница 6: ...vi...
Страница 8: ...viii JUNOSe 11 0 x IP Services Configuration Guide...
Страница 18: ...xviii Table of Contents JUNOSe 11 0 x IP Services Configuration Guide...
Страница 20: ...xx List of Figures JUNOSe 11 0 x IP Services Configuration Guide...
Страница 22: ...xxii List of Tables JUNOSe 11 0 x IP Services Configuration Guide...
Страница 28: ...2 Chapters JUNOSe 11 0 x IP Services Configuration Guide...
Страница 138: ...112 Monitoring J Flow Statistics JUNOSe 11 0 x IP Services Configuration Guide...
Страница 286: ...260 Monitoring IP Tunnels JUNOSe 11 0 x IP Services Configuration Guide...
Страница 312: ...286 Monitoring IP Reassembly JUNOSe 11 0 x IP Services Configuration Guide...
Страница 357: ...Part 2 Index Index on page 333 Index 331...
Страница 358: ...332 Index JUNOSe 11 0 x IP Services Configuration Guide...