HP 6125XLG R2306-HP 6125XLG Blade Switch Layer 3 - IP Routing Command Referenc - Page 261
In BGP IPv6 unicast, argument without matching the masks
View all HP 6125XLG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 261 highlights
filter-policy { acl6-number | prefix-list ipv6-prefix-name } export [ protocol process-id ] undo filter-policy { acl6-number | prefix-list ipv6-prefix-name } export [ protocol process-id ] Default No outbound routing information is filtered. Views BGP IPv4 unicast instance view, BGP-VPN IPv4 unicast instance view, BGP IPv6 unicast instance view, BGP-VPN IPv6 unicast instance view Predefined user roles network-admin Parameters acl-number: Specifies an ACL by its number in the range of 2000 to 3999 to match routes by destination. acl6-number: Specifies an ACL6 by its number in the range of 2000 to 3999 to match routes by destination. prefix-list prefix-list-name: Specifies an IPv4 prefix list by its name, a case-sensitive string of 1 to 63 characters, to match routes by destination. prefix-list ipv6-prefix-name: Specifies an IPv6 prefix list by its name, a case-sensitive string of 1 to 63 characters, to match routes by destination. protocol: Filters routes redistributed from the routing protocol. In BGP IPv4 unicast instance view/BGP-VPN IPv4 unicast instance view, it can be direct, isis, ospf, rip, or static. In BGP IPv6 unicast instance view/BGP-VPN IPv6 unicast instance view, it can be direct, isisv6, ospfv3, ripng, or static. process-id: Specifies a routing protocol by its ID in the range of 1 to 65535. In BGP IPv4 unicast instance view/BGP-VPN IPv4 unicast instance view, it is available only when the protocol is isis, ospf, or rip. In BGP IPv6 unicast instance view/BGP-VPN IPv6 unicast instance view, it is available only when the protocol is isisv6, ospfv3, or ripng. Usage guidelines If a protocol is specified, this command filters only routes redistributed from the specified protocol. If no protocol is specified, this command filters all redistributed routes, including routes redistributed from IGP and injected by the network command. If you use a basic ACL (with a number from 2000 to 2999) configured with the rule [ rule-id ] { deny | permit } source source-address source-wildcard command, the command matches routes whose destination addresses match the source-address source-wildcard argument without matching the masks of the destination addresses. The following guidelines apply when you use an advanced ACL (with a number from 3000 to 3999) in the command: • To deny/permit a route with the specified destination, use the rule [ rule-id ] { deny | permit } ip source sour-addr sour-wildcard command. • To deny/permit a route with the specified destination and mask, use the rule [ rule-id ] { deny | permit } ip source sour-addr sour-wildcard destination dest-addr dest-wildcard command to deny/permit a route with the specified destination and mask. The source keyword specifies the destination address of a route and the destination keyword specifies the subnet mask of the destination. The subnet mask must be contiguous. Otherwise, the configuration does not take effect. 250