On a side note, you don't need reject in isis export policy, since default
is a reject (local and learned isis routes are flooded anyway). In fact,
you can do prefix-suppression with a reject in isis export policy (say,
advertise only loopback and suppress all core links) - something you can't
do in ospf. On Junos, that is.


On Thu, Oct 6, 2016 at 5:33 PM, Saku Ytti <s...@ytti.fi> wrote:

> On 6 October 2016 at 18:12, Hugo Slabbert <h...@slabnet.com> wrote:
>
> > I generally create an explicit 'reject-all' policy and stick that at the
> end
> > of policy lists, rather than nesting the reject within an existing
> policy.
> > It's a bit clearer.
>
> Always terminate as late as sensible policy design allows, as it'll
> make it more extendable, not needing to rewrite those special cases,
> just add new policy. To that effect, also consider default-action
> reject instead of reject, so that you mark route to be rejected,
> unless later otherwise told, this is again useful if you have that one
> special hack, you don't need to rewrite anything, just chain new small
> hack policy to revert that decision.
>
>
> --
>   ++ytti
> _______________________________________________
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to