HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 3 - IP Routing Comma - Page 310

filter-policy import (IPv6 address family view

Page 310 highlights

process-id: Process ID of the routing protocol, in the range of 1 to 65535. It is available only when the protocol is ospfv3 or ripng. Description Use filter-policy export to filter outbound routes using a specified filter. Use undo filter-policy export to cancel filtering outbound routes. By default, no outbound routing information is filtered. If a protocol is specified, only routes redistributed from the specified protocol are filtered. If no protocol is specified, all redistributed routes will be filtered. If you want to reference an advanced ACL (with a number from 3000 to 3999) in the command, the ACL should be configured with the rule [ rule-id ] { deny | permit } ipv6 source sour sour-prefix command to deny/permit a route with the specified destination, or with the rule [ rule-id ] { deny | permit } ipv6 source sour sour-prefix destination dest dest-prefix command to deny/permit a route with the specified destination and prefix. The source keyword specifies the destination address of a route and the destination keyword specifies the prefix of the route (the prefix must be valid; otherwise, the configuration is ineffective). Examples # Reference ACL6 2001 to filter all outbound IPv6 BGP routes. system-view [Sysname] bgp 100 [Sysname-bgp] ipv6-family [Sysname-bgp-af-ipv6] filter-policy 2001 export # Configure ACL6 3000 to permit only route 2001::1/128 to pass, and reference ACL6 3000 to filter outbound routes. system-view [Sysname] acl ipv6 number 3000 [Sysname-acl6-adv-3000] rule 10 permit ipv6 source 2001::1 128 destination ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 128 [Sysname-acl6-adv-3000] rule 100 deny ipv6 [Sysname-acl6-adv-3000] quit [Sysname] bgp 100 [Sysname-bgp] ipv6-family [Sysname-bgp-af-ipv6] filter-policy 3000 export filter-policy import (IPv6 address family view) Syntax filter-policy { acl6-number | ipv6-prefix ipv6-prefix-name } import View undo filter-policy import IPv6 address family view Default level 2: System level 299

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410

299
process-id
: Process ID of the routing protocol, in the range of 1 to 65535. It is available only when the
protocol is
ospfv3
or
ripng
.
Description
Use
filter-policy
export
to filter outbound routes using a specified filter.
Use
undo filter-policy export
to cancel filtering outbound routes.
By default, no outbound routing information is filtered.
If a protocol
is specified, only routes redistributed from the specified protocol are filtered. If no protocol
is specified, all redistributed routes will be filtered.
If you want to reference an advanced ACL (with a number from 3000 to 3999) in the command, the ACL
should be configured with the
rule
[
rule-id
] {
deny
|
permit
}
ipv6 source
sour sour-prefix
command to
deny/permit a route with the specified destination, or with the
rule
[
rule-id
] {
deny
|
permit
}
ipv6 source
sour sour-prefix
destination
dest dest-prefix
command to deny/permit a route with the specified
destination and prefix. The
source
keyword specifies the destination address of a route and the
destination
keyword specifies the prefix of the route (the prefix must be valid; otherwise, the configuration
is ineffective).
Examples
# Reference ACL6 2001 to filter all outbound IPv6 BGP routes.
<Sysname> system-view
[Sysname] bgp 100
[Sysname-bgp] ipv6-family
[Sysname-bgp-af-ipv6] filter-policy 2001 export
# Configure ACL6 3000 to permit only route 2001::1/128 to pass, and reference ACL6 3000 to filter
outbound routes.
<Sysname> system-view
[Sysname] acl ipv6 number 3000
[Sysname-acl6-adv-3000] rule 10 permit ipv6 source 2001::1 128 destination
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 128
[Sysname-acl6-adv-3000] rule 100 deny ipv6
[Sysname-acl6-adv-3000] quit
[Sysname] bgp 100
[Sysname-bgp] ipv6-family
[Sysname-bgp-af-ipv6] filter-policy 3000 export
filter-policy import (IPv6 address family view)
Syntax
filter-policy
{
acl6-number
|
ipv6-prefix
ipv6-prefix-name
}
import
undo filter-policy import
View
IPv6 address family view
Default level
2: System level