Create Filters for the Advanced Routing Engine
Focus
Focus

Create Filters for the Advanced Routing Engine

Table of Contents

Create Filters for the Advanced Routing Engine

Create filters for an Advanced Routing Engine to filter and redistribute routes.
The Advanced Routing Engine supports the filters described in this topic. Access lists, prefix lists, and redistribution route maps can apply to BGP, OSPFv2, OSPFv3 and RIPv2. Access lists and prefix lists can also apply to IPv4 multicast. Multicast route maps apply to IPv4 multicast. AS path access lists, community lists, and BGP route maps apply to BGP only.
Create a filter and reference the filter in a profile or other appropriate location to easily and consistently apply settings that control such things as route acceptance from peers into the local RIB, route advertisements to peers, conditional advertisements, setting attributes, exporting and importing routes to and from other routers, route aggregation, and route redistribution.
  • Access Lists—Use an access list:
    • To filter network routes based on IPv4/IPv6 source addresses and IPv4 destination addresses. For IPv4 access lists, source and destination addresses can be specified by an address and wildcard mask to express a range of addresses. IPv6 access lists can specify source addresses and subnet.
    • In a BGP Filtering profile, specify an Inbound Distribute List (access list) to control which routes BGP will accept from a peer group or peer (neighbor). This means that routes matching a deny access list rule are not placed in the local BGP RIB; routes matching a permit access list rule are placed in the local BGP RIB. You apply the BGP Filtering profile to a BGP peer group or peer in the Filtering IPv4 Unicast or Filtering IPv6 Unicast field. (To do this for a peer, select Inherit No). Peer settings take precedence over peer group settings.
    • In a BGP Filtering profile, specify an Outbound Distribute List (access list) to control which routes the firewall advertises to its peer group or peer, based on your network and BGP deployment. Then apply the BGP Filtering profile to a BGP peer group or peer in the Filtering IPv4 Unicast or Filtering IPv6 Unicast field. (To do this for a peer, select Inherit No). Peer settings take precedence over peer group settings.
    • As match criteria in a Redistribution route map to specify IPv4 or IPv6 destination Addresses, Next Hop, or Route Source.
    • In a BGP route map as match criteria for an IPv4 Address, Next Hop, or Route Source, and also for an IPv6 Address.
    • In OSPFv2 and OSPFv3 Import Lists and Export Lists for an Area Border Router (ABR).
    • To specify PIM group permissions for IPv4 multicast.
    An access list is not for filtering user traffic or for providing security.
    An access list can have multiple rules; routes are evaluated against the rules in sequential order. When a route matches a rule, the deny or permit action occurs and the route is not evaluated against subsequent rules.
    The aggregated view displays all configured access lists; you can highlight an access list to then modify or delete it.
  • Prefix Lists—Use a prefix list:
    • To filter network routes that are added to a local RIB based on route prefix and prefix length.
    • In a BGP Filtering Profile, specify an Inbound Prefix List to control which routes BGP will accept from a peer group or peer (neighbor). This means that routes matching a deny prefix list rule are not placed in the local BGP RIB; routes matching a permit prefix list rule are placed in the local BGP RIB. Then apply the BGP Filtering profile to a BGP peer group in the Filtering IPv4 Unicast or Filtering IPv6 Unicast field. (To do this for a peer, select Inherit No). Peer settings take precedence over peer group settings.
    • In a BGP Filtering profile, specify an Outbound Prefix List to control which routes the firewall advertises to its peer group or peer, based on your network and BGP deployment. Then apply the BGP Filtering profile to a BGP peer group or peer in the Filtering IPv4 Unicast or Filtering IPv6 Unicast field. (To do this for a peer, select Inherit No). Peer settings take precedence over peer group settings.
    • As match criteria in a Redistribution route map to specify IPv4 or IPv6 destination Addresses, Next Hop, or Route Source.
    • In a BGP route map as match criteria for an IPv4 Address, Next Hop, or Route Source, and also for an IPv6 Address.
    • For an OSPFv2 or OSPFv3 ABR of an area, in an Inbound Filter List or Outbound Filter List.
    • In an IPv4 Multicast PIM general configuration to specify an SPT threshold.
    • In an IPv4 Multicast route map.
    A prefix list can have multiple rules; routes are evaluated against the rules in sequential order. When a route matches a rule, the deny or permit action occurs and the route is not evaluated against subsequent rules. A prefix list is flexible in that it allows you to configure a prefix with a prefix length (that together identify the prefix), and also have a range by specifying that the prefix length be greater than, less than, or equal to a value. The firewall evaluates prefix lists more efficiently than access lists.
  • Redistribution Route Maps—Use a Redistribution Route Map in a Redistribution Profile to specify which BGP, OSPFv2, OSPFv3, RIP, connected or static routes (the source protocol) to redistribute to BGP, OSPFv2, OSPFv3, RIP, or the local RIB (the destination protocol). You can also redistribute BGP host routes to BGP peers. The match criteria can include IPv4 and IPv6 addresses specified by an access list and prefix list.
    A Redistribution route map can have multiple entries; routes are evaluated against the entries in sequential order. When a route matches an entry, it is permitted or denied and the route is not evaluated against subsequent entries. If the action of the matching entry is Permit, the firewall also sets the configured attributes from the route map to the redistributed route.
  • Multicast Route Maps—Create a multicast route map to filter sources for a dynamic IGMP interface.
The following filters apply to BGP only.
  • AS Path Access Lists—Create an AS Path access list:
    • To control importing of BGP routes (into the local BGP RIB) that came from another router, use in a BGP Filtering Profile, in the Inbound Filter List. For example, you want to import only routes that came through specific autonomous systems.
    • To control exporting of BGP routes to another router, use in a BGP Filtering Profile, in the Outbound Filter List.
    • To do anything a BGP route map can do, use in a BGP route map as a match criterion.
    • To redistribute BGP routes, use in a BGP Redistribution route map (AS Path) as a match criterion.
    An AS Path access list can have a maximum of 64 rules and ends with an implicit Permit Any rule. Use an AS Path access list to deny autonomous systems. Routes are evaluated against the rules in sequential order. When a route matches a rule, the deny or permit action occurs and the route is not evaluated against subsequent rules.
  • Community Lists—Create a community list:
    • To reference in a BGP route map to match on BGP community attributes of routes that you want to control in some way. For example, you can set a group of routes (that share a community attribute) to have a specific metric or local preference.
    • To reference in the set actions of a BGP route map to remove communities from routes that meet the match criteria.
    • To match BGP communities in routes that you want to redistribute using a Redistribution route map.
    A community list can have multiple rules; routes are evaluated against the rules in sequential order. When a route matches a rule, the deny or permit action occurs and the route is not evaluated against subsequent rules.
  • BGP Route Maps—Create a BGP route map:
    • For the Default Originate Route-Map field of a BGP AFI Profile; the match criteria define when to generate the default route (0.0.0.0). Apply the BGP AFI profile to a BGP peer group or peer. The Match criteria can be any parameter and if there is a match to an existing BGP route, the default route is created; the Set portion of the route map is not used. Instead, you can use an outbound route-map to set properties for the generated default route.
    • To set (override) BGP attributes that BGP is sending to a peer.
    • For NAT, to set Source Address and IPv4 Next Hop for a certain group of prefixes you are advertising, enter a public IP address from the NAT pool to replace a private IP address.
    • To redistribute static, connected, or OSPF routes into BGP; then reference the BGP route map in a BGP Redistribution profile.
    • In a BGP Filtering Profile, use a BGP route map in Inbound Route Map or Outbound Route Map to filter routes that are accepted (learned) from BGP peers into the local BGP RIB (inbound) or advertised to BGP peers (outbound).
    • To conditionally advertise BGP routes, in a BGP Filtering Profile, create an Exist Map, which specifies that if these conditions in the route exist, advertise the route based on an Advertise Map. Alternatively, specify that if these conditions do not exist, advertise the route based on a Non-Exist Advertise Map.
    • In a BGP Filtering Profile, set an IPv4 Next Hop to use a public NAT address rather than a private address.
    • In a BGP Filtering Profile, use a BGP route map to unsuppress routes that were suppressed due to route dampening or aggregation.
    • To conditionally filter more specific routes, for a logical router, configure BGP Aggregate Routes and provide the Suppress Map.
    • To set attributes for an aggregate route, for a logical router, configure BGP Aggregate Routes and provide the Attribute Map.
A filter can have multiple rules; the firewall evaluates packets or routes against the rules in a filter in order by sequence number (Seq) of the rule. When a packet or route matches a rule, the deny or permit action occurs and the packet or route is not evaluated against subsequent rules.
All filters except AS Path access lists end with an implicit Deny Any rule. All filters except for AS Path access lists must have at least one Permit rule; otherwise, all examined routes/packets are denied. AS Path access lists end with an implicit Permit Any rule.
Select a configured Seq number to open a rule and modify it. Select an Action field in a configured rule to modify only the Permit or Deny action.
When adding a rule, leave enough unused sequence numbers between rules to allow future rules to be inserted in the filter. For example, use Seq numbers 10, 20, 30, etc.
  1. Create an access list to permit or deny IPv4 or IPv6 addresses where this filter is applied.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add a Filters Access List by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description.
    4. Select the Type of access list: IPv4 or IPv6.
      1. For IPv4, Add an IPv4 Entry and enter the Seq number for the rule (range is 1 to 65,535).
      2. Select the Action: Deny (the default) or Permit.
      3. For Source Address, there are three options: select Address and in the subsequent Address field, enter an IPv4 address. Enter a Wildcard mask to indicate a range. A zero (0) in the mask indicates that bit must match the corresponding bit in the address; a one (1) in the mask indicates a “don’t care” bit. The other options are Any orNone.
      4. For Destination Address, select Address and in the subsequent Address field, enter an IPv4 address. Enter a Wildcard. A zero (0) in the mask indicates a bit that must match; a one (1) in the mask indicates a “don’t care’ bit. The other options are Any or None.
      5. Click OK to save the entry.
    5. Alternatively, select the Type to be IPv6.
      1. For IPv6, Add an IPv6 Entry and enter the Seq number (range is 1 to 65,535).
      2. Select the Action: Deny (the default) or Permit.
      3. For Source Address, there are three options: select Address and in the subsequent Address field, enter an IPv6 Address. Optionally select Exact Match of this address to have the firewall perform a comparison of both the prefix and prefix length and they must match exactly; otherwise, the firewall determines the match comparison based on whether the route is in the same subnet as the configured prefix. (If the Source Address is Any or None, you cannot select Exact Match of this address.) The other options are Any or None.
      4. Click OK to save the entry. Optionally add more entries.
    6. Click OK to save the access list.
  2. Create a prefix list.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add a Filters Prefix List by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description.
    4. Select the Type of prefix for this rule to filter: IPv4 or IPv6.
      1. For IPv4, Add an IPv4 Entry, and enter the Seq number for the rule; range is 1 to 65,535.
      2. Select the Action: Deny (the default) or Permit.
      3. For Prefix, there are three options; default is None. Another option is to select Network any. The third option is to select Entry and enter an IPv4 Network prefix with slash and a base prefix length that together specify a network, for example, 192.168.2.0/24. Optionally specify that the prefix length be Greater Than Or Equal to a number (that is at least as large as the base length you specified; range is 0 to 32). Optionally specify a top limit to the range by specifying Less Than Or Equal to a number (that is at least as high as the base length and at least as high as the Greater Than Or Equal length if configured; range is 0 to 32).
      Comparing a route to the prefix rule (IPv4 or IPv6) is a two-step process: 1) Match the prefix with the network first. 2) Match the prefix length to the mask range (Greater Than or Equal to Less Than Or Equal). For example, consider the preflix list rule with Network 192.168.3.0/24, and a prefix length Greater Than or Equal to 26 and Less Than or Equal to 30. The following table shows routes that are tested and whether they pass or fail the rule. Routes that pass the rule are subject to the configured action (Deny or Permit).
      Sample Route
      Result
      192.168.3.0/28
      Pass: the network and prefix length match the rule.
      192.168.2.0/30
      Fail: network does not match the rule.
      192.168.3.0/32
      Fail: prefix length does not match the rule.
      In the output summary of the rule, LOU is Logical Operator Unit (equal, greater or equal, less or equal). >= indicates a prefix length greater than or equal to the value; it is the lowest value of a range of the prefix length. <= indicates a prefix length less than or equal to the value; it is the highest value of a range of the prefix length.
    5. Alternatively, Add an IPv6 Entry and follow the steps similar to those for an IPv4 prefix rule. The range of the IPv6 prefix length is Greater Than or Equal to 0 to 128 and Less Than Or Equal to 0 to 128.
      For example, consider the prefix list rule with Network 2001:db8:1/48, and a prefix length Greater Than or Equal to 56 and Less Than or Equal to 64. The following table shows routes that are tested and whether they pass or fail the rule. Routes that pass the rule are subject to the configured action (Deny or Permit).
      Sample Route
      Result
      2001:db8:1/64
      Pass: the network and prefix length match the rule.
      2001:db8:2/48
      Fail: network does not match the rule.
      2001:db8:1/65
      Fail: prefix length does not match the rule.
    6. Click OK to save the prefix entry. Optionally add more entries.
    7. Click OK to save the Prefix List.
  3. Create an AS Path Access List for BGP.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add an AS Path Acess List by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description.
    4. Add an Entry and enter a Seq number; range is 1 to 65,535.
    5. Select the Action: Deny (the default) or Permit.
      Each AS Path access list ends with an implicit Permit Any rule. Use an AS Path access list to deny autonomous systems.
    6. Enter the Aspath Regex (regular expression) in the format regex1:regex2:regex3, where a colon (:) separates three AS values. Characters allowed are 1234567890_^|[,{}()]$*+.?-\. For example, .*65000 in a Deny statement excludes prefixes originating from AS 65000.
    7. Click OK to save the entry. Optionally add more entries; a maximum of 64 entries are allowed in an AS Path access list.
    8. Click OK to save the AS Path access list.
  4. Create a Community List.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add a Filters Community List by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description.
    4. Select the Type:
      • RegularAdd a Seq number (range is 1 to 65,535), select the Action: Deny (the default) or Permit, and Add one or more community values, select one or more well-known communities, or enter a combination of community values and well-known communities. Separate multiple communities with a vertical bar (|), for example, 6409:10|6520:13|internet. Enter a maximum of 16 communities in a Regular entry (rule).
        • A regular community value in the format AA:NN where AA is an AS number and NN is a network number (each with a range of 0 to 65,535).
        • accept-own—Represents well-known community value ACCEPT-OWN (0xFFFF0001)
        • blackhole—Represents well-known community value BLACKHOLE (0xFFFF029A). The neighboring network should discard traffic destined for the prefix.
        • graceful-shutdown—Represents well-known community value GRACEFUL_SHUTDOWN (0xFFFF0000)
        • internet—Represents well-known community value 0 (0x00). Advertise a prefix to all BGP neighbors.
        • local-as—Represents well-known community value NO_EXPORT_SUBCONFED (0xFFFFFF03). The effect is to not advertise the prefix outside of the sub-AS in a confederation.
        • no-advertise—Represents well-known community value NO_ADVERTISE (0xFFFFFF02). Adding this community to a prefix means the receiving BGP peer will place the prefix in its BGP route table, but won’t advertise the prefix to other neighbors.
        • no-export—Represents well-known community value NO_EXPORT (0xFFFFFF01).Adding this community to a prefix means the receiving BGP peer will advertise the prefix only to iBGP neighbors, not neighbors outside the AS.
        • no-peer—Represents well-known community value NOPEER (0xFFFFFF04).
        • route-filter-v4—Represents well-known community value ROUTE_FILTER_v4 (0xFFFF0003).
        • route-filter-v6—Represents well-known community value ROUTE_FILTER_v6 (0xFFFF0005).
      • LargeAdd a Seq number (range is 1 to 65,535), select the Action: Deny (the default) or Permit, and Add a large community regular expression (LC REGEX) entry. Characters allowed in an entry are 1234567890_^|[,{}()]$*+.?-\. Each community must be in the format regex1:regex2:regex3; for example, 203[1-2]:205[2-5]:206[5-6]. Enter a maximum of eight communities in a Large entry (rule).
      • ExtendedAdd a Seq number (range is 1 to 65,535), select the Action: Deny (the default) or Permit, and Add the BGP extended community regular expression (EC REGEX). Characters allowed are 1234567890_^|[,{}()]$*+.?-\. Each extended community must be in the format regex1:regex2; for example, 204*[3-8]:205*[4-8]. Enter a maximum of eight communities in an Extended entry (rule).
    5. Click OK to save the entry in the Community List. Optionally add more entries of the same type (Regular, Large, or Extended).
    6. Click OK to save the Community List.
  5. Create a BGP route map.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add a Filters Route Maps BGP by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description of the route map.
    4. Add a route map and on the Entry tab, assign a Seq number; range is 1 to 65,535.
      Assign sequence numbers that are five or more numbers apart so you have unused numbers for which to insert additional entries in the future.
    5. Enter a helpful Description of the entry (rule).
    6. For Action, select Deny or Permit.
    7. On the Match tab, specify the criteria that determine which routes are subject to the function that uses this route map. Multiple attributes are logically ANDed, meaning all criteria must be met.
      • AS Path Access List—Select an AS path list. Default is None.
      • Regular Community—Select a Community list. Default is None.
      • Large Community—Select a Large Community list. Default is None.
      • Extended Community—Select an Extended Community list. Default is None.
      • Metric—Enter a value in the range 0 to 4,294,967,295.
      • Interface—Select a local interface from the list of all interfaces for all logical routers. Make sure to choose an interface that belongs to the logical router you are configuring. Default is None. At commit, the firewall checks that the interface you chose belongs to the logical router you are configuring.
      • Origin—Select the origin of the route: ebgp, ibgp, or incomplete. Default is none.
      • Tag—Enter a tag value that has meaning in your networks, in the range 0 to 4,294,967,295.
      • Local Preference—Enter a value in the range 0 to 4,294,967,295.
      • Peer—Select a peer name or local (Static or Redistributed routes). Default is none.
    8. Select IPv4 or IPv6 to match on various types of addresses. If you select IPv4:
      • On the Address tab, select an Access List to specify addresses to match.
      • Select a Prefix List to specify addresses to match. It matches the prefix received from a peer or a prefix redistributed to protocol from another protocol.
        If both an access list and prefix list are specified, both requirements must be met (logical AND).
      • On the Next Hop tab, select an Access List to specify next hop addresses to match.
      • Select a Prefix List to specify next hop addresses to match.
      • On the Route Source tab, select an Access List to specify a source IP address of a route to match. For example, the access list could permit a distant peer with the address 192.168.2.2 who is advertising a route to a certain prefix. You can make this BGP route map match on the route’s source address 192.168.2.2 and then perhaps filter the route based on matching the peer address 192.168.2.2 as the source of the route, or set a next hop for routes matching that route source.
      • Specify a Prefix List to specify one or more source network prefixes to match.
    9. If you select IPv6:
      • On the Address tab, select an Access List to specify addresses to match.
      • Select a Prefix List to specify addresses to match.
      • On the Next Hop tab, select an Access List to specify next hop addresses to match.
    10. Set any of the following attributes for routes that meet the match criteria:
      • Enable BGP atomic aggregate—Mark the route as a less specific route because it has been aggregated. ATOMIC_AGGREGATE is a well-known discretionary attribute that alerts BGP speakers along a path that information has been lost due to route aggregation, and therefore the aggregate path might not be the best path to the destination. When some router are aggregated by an aggregator, the aggregator attaches its Router-ID to the aggregated route into the AGGREGATOR-ID attribute and it sets the ATOMIC_AGGREGATE attribute or not, based on whether the AS_PATH information from the aggregated routers was preserved.
      • Aggregator AS—Enter the Aggregator AS. The Aggregator attribute includes the AS number and the IP address of the router that originated the aggregated route.The IP address is the Router ID of the router that performs the route aggregation.
      • Router ID—Enter the aggregator’s Router ID (usually a loopback address).
      • Local Preference—Enter the local preference to which matching routes are set; range is 0 to 4,294,967,295. IBGP Update packets carry local preference, which is advertised to IBGP peers only. When there are multiple routes to another AS, the firewall prefers the highest local preference.
      • Tag—Set a tag; range is 1 to 4,294,967,295.
      • Metric Action—Select an action: set, add, or subtract. You can set the specified Metric Value, or add the specified Metric Value to the matching route’s original metric value, or subtract the specified Metric Value from the matching route’s original metric value; default is set. Select the add or subtract action to adjust a metric and thus prioritize or deprioritize the matching route.
      • Metric Value—Enter the metric value to set matching routes to, or add to, or subtract from the original metric value; range is 0 to 4,294,967,295.
      • Weight—Set a weight (applied locally; not propagated); range is 0 to 4,294,967,295.
      • Origin—Set the origin of the matching routes: ebgp, ibgp, or incomplete (unclear how the route came to be added to the RIB).
      • Originator ID—Set the IP address of the originator of the matching routes.
      • Delete Regular Community—Select a regular community to delete. Default is None.
      • Delete Large Community—Select a large community to delete. Default is None.
      • Select IPv4 or IPv6 as the AFI.
      • On the IPv4 tab, select a Source Address to set from the list of all source addresses from all logical routers or select None. At commit, the firewall checks that the source address you chose belongs to the logical router you are configuring.
      • Select an IPv4 Next-Hop to set: none, peer-address (Use Peer Address), or unchanged.
      • On the IPv6 tab, select IPv6 Nexthop Prefer Global Address to prefer the global unicast address over the other IPv6 address types (link-local address, anycast address, or multicast address) for next hop. (By default, connected peers prefer a link-local next hop address over a global next hop address.)
      • On the IPv6 tab, select a Source Address to set from the list of all source addresses from all logical routers or select None. At commit, the firewall checks that the source address you chose belongs to the logical router you are configuring.
      • Select an IPv6 Next-Hop to set: none or peer-address (Use Peer Address).
      • In the AS Path window, Add up to four AS paths to Exclude from the AS path of matching routes, perhaps to remove an AS from a confederation.
      • Add up to four AS Paths to Prepend to the AS Path of matching route(s) (to make the route in an advertisement less desirable).
      • In the Regular Community window, select Overwrite Regular Community to overwrite the regular community.
      • Add a Regular Community to add one or more regular communities.
      • In the Large Community window, select Overwrite Large Community to overwrite the large community.
      • Add a Large Community to add one or more large communities.
      • In the Regular Community window, select Overwrite Regular Community to overwrite the regular community.
      • Add a Regular Community to add one or more regular communities.
      • In the Large Community window, select Overwrite Large Community to overwrite the large community.
      • Add a Large Community to add one or more large communities.
    11. Click OK to save the route map entry. Optionally add more entries.
    12. Click OK to save the BGP route map.
  6. Create a Redistribution Route Map.
    1. Select NetworkRoutingRouting ProfilesFilters.
    2. Add a Filters Route Maps Redistribution by Name (maximum of 63 characters). The name must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is allowed.
    3. Enter a helpful Description.
    4. To redistribute from a Source Protocol, select BGP, OSPF, OSPFv3, RIP, or Connected Static. The source protocol is where the Match selections apply.
    5. To redistribute the routes to a Destination Protocol or local RIB, select BGP, OSPF, OSPFv3, RIP, or Rib. The destination protocol is where the Set selections apply. The Destination Protocols available in the dropdown depend on the Source Protocol selected. (This step shows an example of BGP redistributed to OSPF.)
    6. Add an Entry and enter the Seq number (range is 1 to 65,535).
    7. Enter a helpful Description.
    8. Select the Action: Deny or Permit.
    9. Select the Match tab to configure criteria for the source protocol; this example specifies BGP attributes to match.
    10. Select an AS Path Access List; default is None.
    11. Select a Regular Community; default is None.
    12. Select a Large Community; default is None.
    13. Select an Extended Community; default is None.
    14. Enter a Metric; range is 0 to 4,294,967,295.
    15. Select an Interface; default is None.
    16. Select the Origin of the route: ebgp, ibgp, or incomplete; default is none.
    17. Enter a Tag; range is 1 to 4,294,967,295.
    18. Enter a Local Preference; range is 0 to 4,294,967,295.
    19. Select a Peer name or local (Static or Redistributed routes); default is none.
    20. The Address tab refers to the Destination address in a route. Select an Access List to specify routes with a destination address that must match in order to be redistributed. Default is None.
    21. Select a Prefix List to specify routes with a destination address that must match in order to be redistributed. Default is None.
    22. Select the Set tab to configure actions to perform on routes matching this rule, which will be redistributed to the destination protocol. (In this example, the destination protocol is OSPF.)
    23. Select the Metric Action for the redistribution rule: you can set the Metric value, add the specified Metric Value to the matching route’s original Metric value, or subtract the specified Metric Value from the matching route’s original Metric value; default is None. Select the add or subtract action to adjust a metric and thus prioritize or deprioritize the matching route.
      For example, you can put the metric of an IGP into BGP by using redistribution. The metric is dynamic, and you can simply add to its value rather than set it to an absolute number.
    24. Enter a Metric Value to set, add to, or subtract from the metric; range is 0 to 4,294,967,295.
    25. Select the Metric Type: Type 1 or Type 2 (because this example uses OSPF as the destination protocol).
    26. Specify a Tag; range is 1 to 4,294,967,295.
    27. Click OK to save the rule. Optionally add more rules.
    28. Click OK to save the Redistribution route map.