R3166-R3206-HP High-End Firewalls Network Management Command Reference-6PW101

Table Of Contents
251
[Sysname] ospf 100
[Sysname-ospf-100] area 1
[Sysname-ospf-100-area-0.0.0.1] filter ip-prefix my-prefix-list import
[Sysname-ospf-100-area-0.0.0.1] filter 2000 export
filter-policy export (OSPF view)
Syntax
filter-policy { acl-number | ip-prefix ip-prefix-name } export [ protocol [ process-id ] ]
undo filter-policy export [ protocol [ process-id ] ]
View
OSPF view
Default level
2: System level
Parameters
acl-number: Number of an ACL used to filter redistributed routes, in the range 2000 to 3999.
ip-prefix-name: Name of an IP prefix list used to filter redistributed routes, a string of up to 19 characters.
protocol: Specifies a protocol from which to filter redistributed routes. The protocol can be direct, static,
rip, ospf or bgp. If no protocol is specified, all redistributed routes are filtered.
process-id: Process ID, which is required when the protocol is rip or ospf, in the range 1 to 65535.
Description
Use the filter-policy export command to configure the filtering of redistributed routes.
Use the undo filter-policy export command to disable the filtering.
By default, the filtering of redistributed routes is not configured.
You can use this command to filter redistributed routes as needed.
NOTE:
If you want to reference an advanced ACL (with a number from 3000 to 3999) in the command, the ACL
should be configured with the rule [
rule-id
] { deny | permit } ip source
sour-addr sour-wildcard
command to deny/permit a route with the specified destination, or with the rule [
rule-id
] { deny |
permit } ip source
sour-addr sour-wildcard
destination
dest-addr dest-wildcard
command to
deny/permit a route with the specified destination and mask. The source keyword specifies the destination
address of a route while the destination keyword specifies the subnet mask of the route (the subnet mask
must be valid; otherwise, the configuration is ineffective).
Related commands: import-route.
Examples
# Filter redistributed routes by using ACL 2000.
<Sysname> system-view
[Sysname] acl number 2000
[Sysname-acl-basic-2000] rule permit source 192.168.10.0 0.0.0.255
[Sysname-acl-basic-2000] quit
[Sysname] ospf 100