List of Tables

Table 1: Notice Icons
Table 2: Text and Syntax Conventions
Table 3: Purpose of Routing Policies and Firewall Filters
Table 4: Implementation Differences Between Routing Policies and Firewall Filters
Table 5: Protocols That Can Be Imported To and Exported from the Routing Table
Table 6: Routing Tables Affected by Routing Policies
Table 7: Default Import and Export Policies for Protocols
Table 8: Match Conditions
Table 9: Protocol Support for Import and Export Policies
Table 10: Routing Policy Match Conditions
Table 11: Flow Control Actions
Table 12: Actions That Manipulate Route Characteristics
Table 13: Policy Action Conversion Values
Table 14: Policy Expression Logical Operators
Table 15: AS Path Regular Expression Operators
Table 16: Examples of AS Path Regular Expressions
Table 17: Community Attribute Regular Expression Operators
Table 18: Examples of Community Attribute Regular Expressions
Table 19: Prefix List and Route List Differences
Table 20: Route List Match Types for a Prefix List Filter
Table 21: Route List Match Types for a Prefix List
Table 22: Match Type Examples
Table 23: Damping Parameters
Table 24: Firewall Filter Application Points
Table 25: IPv4 Firewall Filter Match Conditions
Table 26: IPv6 Firewall Filter Match Conditions
Table 27: Protocol-Independent Firewall Filter Match Conditions
Table 28: Layer 2 Circuit Cross-Connect Firewall Filter Match Conditions
Table 29: MPLS Firewall Filter Match Conditions (Hierarchy Level 1)
Table 30: MPLS Firewall Filter Match Conditions (Hierarchy Level 2)
Table 31: MPLS Firewall Filter Match Conditions (Hierarchy Level 3)
Table 32: VPLS Firewall Filter Match Conditions
Table 33: Layer 2 Bridging Firewall Filter Match Conditions (MX Series Ethernet Services Routers Only)
Table 34: Bit-Field Logical Operators
Table 35: Firewall Filter Actions
Table 36: Unsupported Firewall Statements for Logical Systems
Table 37: Unsupported Firewall Actions and Action Modifiers for Logical Systems