R211x-HP Flexfabric 11900 Layer 3 - IP Routing Command Reference

364
Syntax
In BGP IPv4 unicast address family view/BGP-VPN IPv4 unicast address family view/BGP VPNv4
address family view:
peer { group-name | ip-address } filter-policy acl-number { export | import }
undo peer { group-name | ip-address } filter-policy { export | import }
In BGP IPv6 unicast address family view:
peer { group-name | ipv6-address } filter-policy acl6-number { export | import }
undo peer { group-name | ipv6-address } filter-policy { export | import }
In BGP-VPN IPv6 unicast address family view:
peer { group-name | ipv6-address } filter-policy acl6-number { export | import }
undo peer { group-name | ipv6-address } filter-policy { export | import }
In BGP VPNv6 address family view:
peer { group-name | ip-address } filter-policy acl6-number { export | import }
undo peer { group-name | ip-address } filte
r-policy { export | import }
Default
No ACL-based filtering is configured.
Views
BGP IPv4 unicast address family view, BGP-VPN IPv4 unicast address family view, BGP VPNv4 address
family view, BGP IPv6 unicast address family view, BGP-VPN IPv6 unicast address family view, BGP
VPNv6 address family view
Predefined user roles
network-admin
mdc-admin
Parameters
group-name: Specifies a peer group by its name, a case-sensitive string of 1 to 47 characters. The peer
group must have been created.
ip-address: Specifies a peer by its IP address. The peer must have been created.
ipv6-address: Specifies a peer by its IPv6 address. The peer must have been created.
acl-number: Specifies an ACL by its number in the range of 2000 to 3999.
acl6-number: Specifies an IPv6 ACL by its number in the range of 2000 to 3999.
export: Filters routes advertised to the peer/peer group.
import: Filters routes received from the peer/peer group.
Usage guidelines
The specified ACL referenced by the peer filter-policy command must have been created with the acl
command in system view. Otherwise, all routes can pass the ACL.
If you use a basic ACL (with a number from 2000 to 2999) configured with the rule [ rule-id ] { deny |
permit } source source-address source-wildcard command, the command matches whose destination