<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering learned BGP routes in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66735#M5083</link>
    <description>&lt;P&gt;Here is another example:&lt;/P&gt;&lt;P&gt;Let's say you are peering with ASN 54321 and ASN 12345.&amp;nbsp; In the example below, we will NOT accept a default route from 54321 and we are validating that any other route from that peer must have ASN 54321 in the AS Path.&amp;nbsp; For peer 12345, we are again validating ASN 12345 is in the path by only accepting routes with that ASN in the path and then we will accept any 10/8 route or smaller, only 172.16/12 (nothing more, nothing less) and anything smaller than 192.168/16.&lt;/P&gt;&lt;P&gt;set routemap bgp-in-54321 id 10 on&lt;BR /&gt;set routemap bgp-in-54321 id 10 restrict&lt;BR /&gt;set routemap bgp-in-54321 id 10 match network 0.0.0.0/0 exact&lt;BR /&gt;set routemap bgp-in-54321 id 20 on&lt;BR /&gt;set routemap bgp-in-54321 id 20 allow&lt;BR /&gt;set routemap bgp-in-54321 id 20 match as 54321 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 allow&lt;BR /&gt;set routemap bgp-in-12345 id 20 match as 12345 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 10.0.0.0/8 all&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 172.16.0.0/12 exact&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 192.168.0.0/16 refines&lt;/P&gt;&lt;P&gt;set bgp external remote-as 54321 import-routemap bgp-in-54321 preference 10 on&lt;BR /&gt;set bgp external remote-as 12345 import-routemap bgp-in-12345 preference 10 on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some commands I've found helpful:&lt;/P&gt;&lt;P&gt;show bgp peers&amp;nbsp; &amp;nbsp; &amp;lt;-- shows the state&lt;BR /&gt;show bgp peer 1.2.3.4 advertise&amp;nbsp; &amp;nbsp;&amp;lt;-- shows the routes being sent to that peer&lt;BR /&gt;show bgp peer 1.2.3.4 received&amp;nbsp; &amp;nbsp; &amp;lt;-- shows the routes being learned from that peer (even routes that are not made active in the firewall's route table)&lt;BR /&gt;show route bgp aspath&amp;nbsp; &amp;nbsp;&amp;lt;-- see the aspath on routes&lt;BR /&gt;show route bgp all&amp;nbsp; &amp;nbsp;&amp;lt;-- see all active and inactive bgp routes&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2019 04:18:10 GMT</pubDate>
    <dc:creator>Brian_Deutmeyer</dc:creator>
    <dc:date>2019-11-07T04:18:10Z</dc:date>
    <item>
      <title>Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66714#M5080</link>
      <description>&lt;P&gt;Good Afternoon,&lt;/P&gt;&lt;P&gt;I'm setting up a new datacenter cluster and I'm going to be learning routes from three peers via BGP.&amp;nbsp; I understand I need an inbound filter to add them to my routing table, but I don't want to blindly learn any route that I'm sent based on AS number.&amp;nbsp; How can I setup a prefix list and apply it to a neighbor (in Cisco terms) so I can trust but verify?&lt;/P&gt;&lt;P&gt;I understand its probably in CLI as opposed to WebUI, but I'm having trouble finding documentation for specifically what I'm trying to do.&amp;nbsp; Any guidance would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Paul&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 19:34:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66714#M5080</guid>
      <dc:creator>Paul_Warnagiris</dc:creator>
      <dc:date>2019-11-06T19:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66728#M5081</link>
      <description>&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;Hope you are doing fine, I think that this could be achieved with inbound filters and route maps from the advance routing section&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_Gaia_Advanced_Routing_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_Gaia_Advanced_Routing_AdminGuide/162207" target="_self"&gt;Advance Routing - Inbound filters &amp;amp; Route maps&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know how it goes &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 00:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66728#M5081</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-11-07T00:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66734#M5082</link>
      <description>&lt;P&gt;You can do something like this.&lt;/P&gt;
&lt;P&gt;set prefix-list routes-inbound sequence-number 10 prefix 11.12.0.0/16 between 16 and 30&lt;BR /&gt;set routemap routes-inbound id 1 on&lt;BR /&gt;set routemap routes-inbound id 1 allow&lt;BR /&gt;set routemap routes-inbound id 1 match prefix-list routes-inbound preference 1 on&lt;BR /&gt;set bgp external remote-as 65000 import-routemap "routes-inbound" preference 1 on&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 03:52:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66734#M5082</guid>
      <dc:creator>Lari_Luoma</dc:creator>
      <dc:date>2019-11-07T03:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66735#M5083</link>
      <description>&lt;P&gt;Here is another example:&lt;/P&gt;&lt;P&gt;Let's say you are peering with ASN 54321 and ASN 12345.&amp;nbsp; In the example below, we will NOT accept a default route from 54321 and we are validating that any other route from that peer must have ASN 54321 in the AS Path.&amp;nbsp; For peer 12345, we are again validating ASN 12345 is in the path by only accepting routes with that ASN in the path and then we will accept any 10/8 route or smaller, only 172.16/12 (nothing more, nothing less) and anything smaller than 192.168/16.&lt;/P&gt;&lt;P&gt;set routemap bgp-in-54321 id 10 on&lt;BR /&gt;set routemap bgp-in-54321 id 10 restrict&lt;BR /&gt;set routemap bgp-in-54321 id 10 match network 0.0.0.0/0 exact&lt;BR /&gt;set routemap bgp-in-54321 id 20 on&lt;BR /&gt;set routemap bgp-in-54321 id 20 allow&lt;BR /&gt;set routemap bgp-in-54321 id 20 match as 54321 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 allow&lt;BR /&gt;set routemap bgp-in-12345 id 20 match as 12345 on&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 10.0.0.0/8 all&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 172.16.0.0/12 exact&lt;BR /&gt;set routemap bgp-in-12345 id 20 match network 192.168.0.0/16 refines&lt;/P&gt;&lt;P&gt;set bgp external remote-as 54321 import-routemap bgp-in-54321 preference 10 on&lt;BR /&gt;set bgp external remote-as 12345 import-routemap bgp-in-12345 preference 10 on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some commands I've found helpful:&lt;/P&gt;&lt;P&gt;show bgp peers&amp;nbsp; &amp;nbsp; &amp;lt;-- shows the state&lt;BR /&gt;show bgp peer 1.2.3.4 advertise&amp;nbsp; &amp;nbsp;&amp;lt;-- shows the routes being sent to that peer&lt;BR /&gt;show bgp peer 1.2.3.4 received&amp;nbsp; &amp;nbsp; &amp;lt;-- shows the routes being learned from that peer (even routes that are not made active in the firewall's route table)&lt;BR /&gt;show route bgp aspath&amp;nbsp; &amp;nbsp;&amp;lt;-- see the aspath on routes&lt;BR /&gt;show route bgp all&amp;nbsp; &amp;nbsp;&amp;lt;-- see all active and inactive bgp routes&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 04:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66735#M5083</guid>
      <dc:creator>Brian_Deutmeyer</dc:creator>
      <dc:date>2019-11-07T04:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66771#M5086</link>
      <description>&lt;P&gt;Thank you for your reply.&amp;nbsp; I found it to be very helpful.&amp;nbsp; I think I am missing something though.&amp;nbsp; I did this routemap just for a test:&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 on&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 restrict&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 match network 10.0.0.0/8 all&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;However, when I do a show configuration my set command is commented out as shown below.&amp;nbsp; I believe this is my problem.&amp;nbsp; Have you ever seen this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;FONT color="#FF0000"&gt;##&lt;/FONT&gt; The following items are listed under their respective command sets&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;&lt;FONT color="#FF0000"&gt;##&lt;/FONT&gt; (e.g. "set bgp") and are displayed here for informational purposes:&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;&lt;FONT color="#FF0000"&gt;#&lt;/FONT&gt; set bgp external remote-as 65534 import-routemap bgp-in-65534 preference 10 on&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;Therefore I am still getting advertisements, but they are still inactive/hidden.&amp;nbsp; See some show commands below.&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt; show route exact 10.21.6.0/24&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;Codes: C - Connected, S - Static, R - RIP, B - BGP (D - Default),&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed,&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;U - Unreachable, i - Inactive&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt; show route bgp detailed&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt; show bgp peer 172.31.31.74 received &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;IPv4 Route&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;MED &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;LocalPref &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Nexthop&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Communities&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.1.4/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.1.5/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.1.8/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.1.9/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.1/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.4.4/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.4.6/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.4.8/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.4.9/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009&lt;BR /&gt;1&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;0.4/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.5.2/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;10.5.4/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;None&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;N/A (eBGP)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;172.31.31.74 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;8009:8009 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt; show route all&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;Codes: C - Connected, S - Static, R - RIP, B - BGP (D - Default),&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA),&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed,&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;U - Unreachable, i - Inactive&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;S &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;0.0.0.0/0 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 8.9.10.11, eth1, cost 0, age 560686&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;C &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;1.1.1.0/30&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;is directly connected, bond1&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Bond FW01&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;H i&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/FONT&gt;10.1.4.0/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 172.31.31.74, eth2, cost None, age 931&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;SDWan BGP&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;H i&lt;/FONT&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.1.4.0/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 172.31.31.73, eth2, cost None, age 931&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;SDWan BGP&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;H i&lt;/FONT&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.1.5.0/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 172.31.31.74, eth2, cost None, age 931&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;SDWan BGP&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;H i&lt;/FONT&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.1.5.0/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 172.31.31.73, eth2, cost None, age 931&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;SDWan BGP&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;H i&lt;/FONT&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.1.8.0/24 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 172.31.31.74, eth2, cost None, age 931&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;SDWan BGP&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 11:47:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66771#M5086</guid>
      <dc:creator>Paul_Warnagiris</dc:creator>
      <dc:date>2019-11-07T11:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66784#M5088</link>
      <description>&lt;P&gt;First off, the routemap you are testing with does nothing, so I'm not sure what you are trying to test.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The commented out line for applying the routemap is for informational use only when looking at the routemap config.&amp;nbsp; The actual config line that is used is with the bgp config.&lt;/P&gt;&lt;P&gt;show configuration bgp&amp;nbsp; &amp;lt;-- it lives here&lt;BR /&gt;show configuration routemaps&amp;nbsp; &amp;lt;-- comment line is here for information use only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way the routing table is setup, it contains:&lt;BR /&gt;1. Active routes&lt;BR /&gt;2. Inactive routes (i)&lt;BR /&gt;3. Hidden routes&amp;nbsp; (H)&lt;/P&gt;&lt;P&gt;By default, with no routemaps configured, all received routes from peers will be Hidden (and inactive).&amp;nbsp; Once you configure a routemap to accept routes, those routes will no longer be hidden and become active.&amp;nbsp; However, if you have two or more exact routes (like 192.168.0.0/24) from two or more peers, then a selection process takes place to make one route active and the others will remain inactive.&amp;nbsp; If the peer with the active route goes away, the route from the next peer based on the selection will go active.&lt;/P&gt;&lt;P&gt;show route&amp;nbsp; &amp;lt;-- shows only active routes&lt;BR /&gt;show route all&amp;nbsp; &amp;nbsp;&amp;lt;-- show all routes&amp;nbsp; (active, inactive and hidden)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your 'show bgp peer x.x.x.x received' shows that you are receiving routes from that specific peer.&amp;nbsp; Your 'show route all' shows the routes in the routetable.&amp;nbsp; So far, so good.&amp;nbsp; You just need a routemap to flip those routes active. If you are just wanting the routes shown to go active, run this command:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#FF0000"&gt;set routemap bgp-in-65534 id 10 allow&lt;/FONT&gt;&amp;nbsp; &amp;nbsp;&amp;lt;-- This will start making routes active, instead of the restrict you currently have to keep them hidden&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;At the simplest form, this routemap will accept any route from the peer:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;set routemap bgp-in id 10 on&lt;BR /&gt;set routemap bgp-in id 10 allow&lt;BR /&gt;set bgp external remote-as 12345 import-routemap bgp-in preference 10 on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And this will redistribute any directly connected network, static route and any BGP route that are &lt;STRONG&gt;active&lt;/STRONG&gt; in the route table:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;set routemap bgp-out id 10 on&lt;BR /&gt;set routemap bgp-out id 10 allow&lt;BR /&gt;set routemap bgp-out id 10 match protocol direct&lt;BR /&gt;set routemap bgp-out id 20 on&lt;BR /&gt;set routemap bgp-out id 20 allow&lt;BR /&gt;set routemap bgp-out id 20 match protocol static&lt;BR /&gt;set routemap bgp-out id 30 on&lt;BR /&gt;set routemap bgp-out id 30 allow&lt;BR /&gt;set routemap bgp-out id 30 match protocol bgp&lt;BR /&gt;set bgp external remote-as 12345 export-routemap bgp-out preference 10 on&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 14:37:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66784#M5088</guid>
      <dc:creator>Brian_Deutmeyer</dc:creator>
      <dc:date>2019-11-07T14:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66792#M5089</link>
      <description>&lt;P&gt;Got it.&amp;nbsp; I knew most of what you described, but my problem was &lt;FONT face="courier new,courier"&gt;restrict&lt;/FONT&gt; and not &lt;FONT face="courier new,courier"&gt;allow&lt;/FONT&gt; in my route map.&amp;nbsp; Stupid.&amp;nbsp; I just needed a second set of eyes I guess.&amp;nbsp; After removing restrict and adding allow my routes are now redistributed into the CP routing table.&amp;nbsp; Thanks for the sanity check.&lt;/P&gt;&lt;P&gt;I'm still not 100% certain why&amp;nbsp; &lt;FONT face="courier new,courier"&gt;set bgp external&lt;/FONT&gt; statement is commented out, but thats fine.&amp;nbsp; As long as it works.&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt; show configuration routemaps&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 on&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 allow&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set routemap bgp-in-65534 id 10 match network 10.0.0.0/8 all&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;## The following items are listed under their respective command sets&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;## (e.g. "set bgp") and are displayed here for informational purposes&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;# set bgp external remote-as 65534 import-routemap bgp-in-65534 preference 10 on&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;FW01&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Thank you to all that replied.&lt;BR /&gt;Paul&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 16:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66792#M5089</guid>
      <dc:creator>Paul_Warnagiris</dc:creator>
      <dc:date>2019-11-07T16:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66806#M5091</link>
      <description>&lt;P&gt;Glad it is working. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;set bgp external...import-routemap...&lt;/FONT&gt; command will show commented out when you run '&lt;FONT face="courier new,courier"&gt;show configuration routemaps&lt;/FONT&gt;'.&amp;nbsp; It will &lt;STRONG&gt;not&lt;/STRONG&gt; be commented out when you run '&lt;FONT face="courier new,courier"&gt;show configuration bgp&lt;SPAN&gt;'.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 19:55:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/66806#M5091</guid>
      <dc:creator>Brian_Deutmeyer</dc:creator>
      <dc:date>2019-11-07T19:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering learned BGP routes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/67016#M5108</link>
      <description>&lt;P&gt;As BGP doesn't accept any routes by default, the inbound filters must always be configured.&lt;/P&gt;
&lt;P&gt;You can use the following command to allow all IPv4 for example.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;set inbound-route-filter bgp-policy 512 based-on-as as 65000 on&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;set inbound-route-filter bgp-policy 512 accept-all-ipv4&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bgp_inbound_route_filter.PNG" style="width: 629px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3039iCD15C12A059DA877/image-size/large?v=v2&amp;amp;px=999" role="button" title="bgp_inbound_route_filter.PNG" alt="bgp_inbound_route_filter.PNG" /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 17:55:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Filtering-learned-BGP-routes/m-p/67016#M5108</guid>
      <dc:creator>Lari_Luoma</dc:creator>
      <dc:date>2019-11-10T17:55:15Z</dc:date>
    </item>
  </channel>
</rss>

