To have a better experience, please upgrade your IE browser.upgrade
Questo sito utilizza cookie di profilazione (propri e di terze parti) per ottimizzare la tua esperienza online e per inviarti pubblicità in linea con le tue preferenze. Continuando a utilizzare questo sito senza modificare le tue preferenze acconsenti all’uso dei cookie. Se vuoi saperne di più o negare il consenso a tutti o ad alcuni cookie clicca qui>
The website that you are visiting also provides Arabian language. Do you wish to switch language version?
يوفر موقع الويب الذي تزوره المحتوى باللغة العربية أيضًا. هل ترغب في تبديل إصدار اللغة؟
The website that you are visiting also provides Russia language Do you wish to switch language version?
Данный сайт есть в английской версии. Желаете ли Вы перейти на английскую версию?
Smart Modular Data Centers
Prefabricated Modular Data Centers
Precision Air Conditioners
Data Center Management
Handsets and Terminals
Rapid Deployment System
Enterprise Communications Terminals
Platform or Infrastructure
Enterprise Communications Gateways
Core Network Devices
Radio Access Network Devices
Firewall and Application Security Gateway
DDoS Protection Systems
Anti-APT Based on Big Data Analysis
ME Series Multi-Service Control Gateways
Multi-Service Packet Transport Platforms
AR Series IoT Gateways
AR Series Access Routers
Hybrid Flash Storage
Integrated Video Site Solution
Enterprise Telecom Energy
Smart Site Management System
Multi-Service Transmission Platforms
HD Network Cameras
Video Cloud Nodes
Video Content Management
Indoor Access Points
Outdoor Access Points
Scenario-specific product series
IT Infrastructure Storage Solutions
Data Center Network
Data Center Energy
Enterprise Communications Solution
Contact Center Solution
Advisory and Implementation
Support and Optimization
Training and Certification
Explore Technology Services
National Research and Education Network
Education Cloud Data Center
Multi-Channel HD Telemedicine Solution
Over The Top/Multi-Tenant Data Center (OTT/MTDC)
Internet Exchange Point (IXP)
Internet Access Provider (IAP)
Design & Simulation
Planning & Analytics
Oil & Gas IoT
HPC & Operations Management
Digital Urban Rail
Retail Cloud Platform
Enterprise Data Center
Enterprise Cloud Communications
Network Management System
Buy from Huawei
If you need to get information about your project, please submit your information and we will contact you within one working day.
Consult online customer service regarding products/solutions you are interested in.
If your company has signed an eDeal contract with Huawei, please buy your required product/solution via the link below.
Buy from resellers
Search for a nearby reseller and get direct contact information.
Find a Partner
Become a Partner
Alliance and solution Partner
Huawei Authorized Learning Partner
Huawei Authorized Information and Network Academy
The networking diagram is shown in Figure 3-1.
In the network, USG A adopts the IP-Prefix list to filter the route received from USG B.
The configuration on USG A:
# ospf 100 # ip ip-prefix rta index 20 deny 220.127.116.11 32 #
The configuration on USG B:
# OSPF 200 # network 18.104.22.168 255.255.255.255 network 22.214.171.124 255.255.255.255 #
Run the display ip routing-table command to view the route received on USG A. The route 126.96.36.199/32 should be received. The route does not appear in the routing table.
To locate the fault, follow the steps described below:
Check the routing table on USG B to confirm whether all the routes are advertised to USG A.
On USG B, run the display ip routing-table command to display information of the routing table. If the routes 188.8.131.52/32 and 184.108.40.206/32 have been advertised to USG A, the fault occurs on USG A.
Check the OSPF configuration on USG A to confirm if the filter is enabled when the route is received.
On USG A, run the display current-configuration configuration ospf command to check the ospf configuration. If the IP-Prefix filter is adopted when USG A receives the route from USG B, there is a possibility that all the routes are filtered out.
Check the configuration of the IP-Prefix list and confirming if the route is filtered out by the IP-Prefix list.
On USG A, run the display ip ip-prefix rta command to view the filter configuration. If only the route 220.127.116.11/32 is configured with deny but the route 18.104.22.168/32 is not configured with permit. Thus, the fault is located.
When USG A adopts the IP-Prefix list to filter the route received from USG B and for the non-matched route, the system returns deny by default. The route 22.214.171.124/32 is , therefore, filtered out.
When only the deny node is configured in the IP-Prefix list, the route outside the matching address/mask range is denied by default.
Configure the permit node to allow the specified route to pass through, or after the deny node is configured, define an entry of permit 0.0.0.0 0 greater-equal 0 less-equal 32 to permit all routes to pass through.