From 8f9505715dadcc64de021613c7b15e38e5728a63 Mon Sep 17 00:00:00 2001 From: Donald Sharp Date: Tue, 19 May 2015 18:29:15 -0700 Subject: [PATCH] 'show ip bgp neighbors 10.1.1.2 advertised-routes' fails for route-reflector-clients --- bgpd/bgp_route.c | 23 +++-------------------- 1 file changed, 3 insertions(+), 20 deletions(-) diff --git a/bgpd/bgp_route.c b/bgpd/bgp_route.c index db2a515846..1a8fb3562b 100644 --- a/bgpd/bgp_route.c +++ b/bgpd/bgp_route.c @@ -11688,16 +11688,9 @@ show_adj_route (struct vty *vty, struct peer *peer, afi_t afi, safi_t safi, } if (adj->attr) { - if (!CHECK_FLAG(peer->af_flags[afi][safi], - PEER_FLAG_REFLECTOR_CLIENT) - || bgp_flag_check(bgp, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY)) - { - bgp_attr_dup(&attr, adj->attr); - ret = bgp_output_modifier(peer, &rn->p, &attr, afi, - safi, rmap_name); - } - else - ret = RMAP_PERMIT; + bgp_attr_dup(&attr, adj->attr); + ret = bgp_output_modifier(peer, &rn->p, &attr, afi, + safi, rmap_name); if (ret != RMAP_DENY) { @@ -11732,16 +11725,6 @@ peer_adj_routes (struct vty *vty, struct peer *peer, afi_t afi, safi_t safi, return CMD_WARNING; } - if (!in && (CHECK_FLAG(peer->af_flags[afi][safi], PEER_FLAG_REFLECTOR_CLIENT) - && !bgp_flag_check(peer->bgp, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY))) - { - vty_out (vty, "%% Cannot apply outgoing route-map on route-reflector clients%s", - VTY_NEWLINE); - vty_out (vty, "%% Enable bgp route-reflector allow-outbound-policy flag%s", - VTY_NEWLINE); - return CMD_WARNING; - } - show_adj_route (vty, peer, afi, safi, in, rmap_name); return CMD_SUCCESS; -- 2.39.5