<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BGP Route Map to restrict certain ranges from private ranges in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/174071#M31651</link>
    <description>&lt;P&gt;In order to understand why this isn't working, this will likely need a ticket with TAC.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Mar 2023 17:47:36 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-03-08T17:47:36Z</dc:date>
    <item>
      <title>BGP Route Map to restrict certain ranges from private ranges</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/173942#M31625</link>
      <description>&lt;P&gt;I have the following route map:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;set routemap t0privedge-out id 10 on
set routemap t0privedge-out id 10 restrict
set routemap t0privedge-out id 10 match network 10.0.0.1/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.2/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.3/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.4/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.5/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.101/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.102/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.103/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.104/32 exact
set routemap t0privedge-out id 10 match network 10.0.0.105/32 exact
set routemap t0privedge-out id 10 match network 10.50.171.64/26 all
set routemap t0privedge-out id 10 match network 10.50.171.128/26 all
set routemap t0privedge-out id 10 match network 10.51.1.0/28 all
set routemap t0privedge-out id 10 match network 172.19.0.0/29 all
set routemap t0privedge-out id 10 match network 172.19.0.8/29 all
set routemap t0privedge-out id 10 match network 172.19.0.40/29 all
set routemap t0privedge-out id 10 match network 172.19.18.0/29 all
set routemap t0privedge-out id 10 match network 172.21.0.0/28 all
set routemap t0privedge-out id 20 on
set routemap t0privedge-out id 20 allow
set routemap t0privedge-out id 20 match network 10.0.0.0/8 all
set routemap t0privedge-out id 20 match protocol direct
set routemap t0privedge-out id 30 on
set routemap t0privedge-out id 30 allow
set routemap t0privedge-out id 30 match network 172.16.0.0/12 all
set routemap t0privedge-out id 30 match protocol direct
set routemap t0privedge-out id 40 on
set routemap t0privedge-out id 40 allow
set routemap t0privedge-out id 40 match network 192.168.0.0/16 all
set routemap t0privedge-out id 40 match protocol direct
set routemap t0privedge-out id 100 on
set routemap t0privedge-out id 100 restrict&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+ this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt; set routemap dflt-out id 10 on
 set routemap dflt-out id 10 allow
 set routemap dflt-out id 10 match network 0.0.0.0/0 exact
 set routemap dflt-out id 100 on
 set routemap dflt-out id 100 restrict
 &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then applied against my bgp:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;set bgp external remote-as 65007 export-routemap "dflt-out" preference 10 on
set bgp external remote-as 65007 export-routemap "t0privedge-out" preference 20 on&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm still seeing the restricted subnets in id 10 as advertised however, along with the directly connected routes I also expect. Why is this?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 22:16:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/173942#M31625</guid>
      <dc:creator>dphonovation</dc:creator>
      <dc:date>2023-03-07T22:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: BGP Route Map to restrict certain ranges from private ranges</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/173948#M31632</link>
      <description>&lt;P&gt;Version/JHF of gateway?&lt;BR /&gt;Also tagging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24175"&gt;@Sundeep_Mudgal&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 00:10:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/173948#M31632</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T00:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: BGP Route Map to restrict certain ranges from private ranges</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/174071#M31651</link>
      <description>&lt;P&gt;In order to understand why this isn't working, this will likely need a ticket with TAC.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 17:47:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BGP-Route-Map-to-restrict-certain-ranges-from-private-ranges/m-p/174071#M31651</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T17:47:36Z</dc:date>
    </item>
  </channel>
</rss>

