R3303-HP HSR6800 Routers Layer 3 - IP Routing Command Reference

101
Related commands
import-route
filter-policy import (OSPF view)
Use filter-policy import to configure OSPF to filter routes calculated from received LSAs.
Use undo filter-policy import to disable the filtering.
Syntax
filter-policy { acl-number [ gateway ip-prefix-name ] | gateway ip-prefix-name | ip-prefix ip-prefix-name
[ gateway ip-prefix-name ] | route-policy route-policy-name } import
undo filter-policy import
Default
The filtering is not configured.
Views
OSPF view
Default command level
2: System level
Parameters
acl-number: Specifies an ACL by its number in the range of 2000 to 3999 to filter received routes.
gateway ip-prefix-name: Specifies an IP prefix list by its name to filter routes received from specific
neighbors. It is a string of up to 19 characters. For more information about IP prefix lists, see Layer 3IP
Routing Configuration Guide.
ip-prefix ip-prefix-name: Specifies an IP prefix list by its name to filter received routes based on
destination IP address. It is a string of up to 19 characters. For more information about IP prefix lists, see
Layer 3—IP Routing Configuration Guide.
route-policy route-policy-name: Specifies a routing policy by its name to filter received routes based on
routing policy, a string of up to 63 case-sensitive characters. For more information about routing policy,
see Layer 3—IP Routing Configuration Guide.
Usage guidelines
To reference an advanced ACL (with a number from 3000 to 3999) in the command, configure the ACL
in one of the following ways:
To deny/permit a route with the specified destination, use the rule [ rule-id ] { deny | permit } ip
source sour-addr sour-wildcard command.
To deny/permit a route with the specified destination and mask, use the rule [ rule-id ] { deny |
permit } ip source sour-addr sour-wildcard destination dest-addr dest-wildcard command.
The source keyword specifies the destination address of a route and the destination keyword specifies the
subnet mask of the route. (The subnet mask must be valid; otherwise, the configuration is ineffective.)