The system view is displayed.
The RIP view is displayed.
Run filter-policy { acl-number | acl-name acl-name } import [ interface-type interface-number ]
Learned routing information is filtered based on an ACL.
Run filter-policy gateway ip-prefix-name import
Routing information advertised by neighbors is filtered based on the IP prefix list.
Run filter-policy ip-prefix ip-prefix-name [ gateway ip-prefix-name ] import [ interface-type interface-number ]
Routes learned by the specified interface are filtered based on the IP prefix list and neighbors.
The system view is displayed.
The OSPF process view is displayed.
OSPF is configured to filter received routes.
The filter-policy import command filters the routes calculated by OSPF but cannot filter advertised or received LSAs. Only the routes that pass the filtering criteria are added to the OSPF routing table. However, routes that do not pass the filtering criteria are not added to the OSPF routing table but can still be advertised.
The system view is displayed.
The IS-IS view is displayed.
IS-IS routes that match the filter-policy are delivered to the IP routing table.
The system view is displayed.
The BGP view is displayed.
If an ACL has been referenced in the filter-policy command but no VPN instance is specified in the ACL rule, BGP will filter routes including public and private network routes in all address families. If a VPN instance is specified in the ACL rule, only the data traffic from the VPN instance will be filtered, and no route of this VPN instance will be filtered.
The system view is displayed.
The BGP view is displayed.
To filter routes based on an ACL, run the peer { group-name | ipv4-address | ipv6-address } filter-policy { acl-number | acl-name acl-name | acl6-number | acl6-name acl6-name } import command.
To filter routes based on an IP prefix list, run the peer { ipv4-address | group-name } ip-prefix ip-prefix-name import or the peer { group-name | ipv4-address | ipv6-address } ipv6-prefix ipv6-prefix-name import command.
To filter routes based on an AS_Path filter, run the peer { ipv4-address | group-name | ipv6-address } as-path-filter { as-path-filter-number | as-path-filter-name } import command.
To filter routes based on a route-policy, run the peer { ipv4-address | group-name | ipv6-address } route-policy route-policy-name import command.
The routing policy applied in the peer route-policy import command does not support a specific interface as one matching rule. That is, the routing policy does not support the if-match interface command.
If the number of routes received by the local device exceeds the upper limit and the peer route-limit command is used for the first time, the local device and its peer reestablish the peer relationship, regardless of whether alert-only is set.
The maximum number of routes that can be received from the peer or peer group is set.