Disable-Send-Community

This scenario demonstrates how to configure the disable-send-community option for a BGP neighbor. The disable-send-community command prevents sending community attributes to a neighbor. Tests verify default behavior (community sent) and disable-send-community standard option.

Test iBGP - Neighbor send-community enabled by default

Description

Test to verify that BGP community attributes are sent to neighbors by default. DUT0 advertises route 1.1.1.0/24 with community 65000:100. DUT1 should receive the route with the community attribute visible.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 1.1.1.1/24
set interfaces ethernet eth0 address 10.10.0.100/24
set protocols bgp 20 neighbor peer remote-address 10.10.0.200
set protocols bgp 20 neighbor peer remote-as 20
set protocols bgp 20 redistribute connected route-map SET-COMM
set protocols route-map SET-COMM rule 10 action permit
set protocols route-map SET-COMM rule 10 set community value '65000:100'
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 10.10.0.200/24
set protocols bgp 20 neighbor peer remote-address 10.10.0.100
set protocols bgp 20 neighbor peer remote-as 20
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Attention

Verify iBGP session establishes.

Step 3: Run command protocols bgp show ip summary at DUT0 and check if output matches the following regular expressions:

10.10.0.200.*Established
Show output
IPv4 Unicast Summary:
BGP router identifier 10.10.0.100, local AS number 20 VRF default vrf-id 0
BGP table version 2
RIB entries 3, using 384 bytes of memory
Peers 1, using 24 KiB of memory

Neighbor        LocalAddr       V         AS   MsgRcvd   MsgSent   TblVer  InQ OutQ  Up/Down        State   PfxRcd   PfxSnt Desc
10.10.0.200     10.10.0.100     4         20         3         6        2    0    0 00:00:01  Established        0        2 FRRouting/10.4.1

Total number of neighbors 1

Attention

Verify that DUT1 receives route 1.1.1.0/24 with community 65000:100.

Step 4: Run command protocols bgp show ip 1.1.1.0/24 at DUT1 and check if output matches the following regular expressions:

Community: 65000:100
Show output
BGP routing table entry for 1.1.1.0/24, version 1
Paths: (1 available, best #1, table default)
  Not advertised to any peer
  Local
    10.10.0.100 from 10.10.0.100 (10.10.0.100)
      Origin incomplete, metric 0, localpref 100, valid, internal, best (First path received)
      Community: 65000:100
      Last update: Thu Mar  5 14:29:46 2026

Test iBGP - Neighbor disable-send-community standard

Description

Test to verify that disable-send-community standard prevents sending community. DUT0 advertises route 1.1.1.0/24 with community 65000:100 but configures disable-send-community standard. DUT1 should receive the route but NOT the community.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 1.1.1.1/24
set interfaces ethernet eth0 address 10.10.0.100/24
set protocols bgp 20 neighbor peer disable-send-community standard
set protocols bgp 20 neighbor peer remote-address 10.10.0.200
set protocols bgp 20 neighbor peer remote-as 20
set protocols bgp 20 redistribute connected route-map SET-COMM
set protocols route-map SET-COMM rule 10 action permit
set protocols route-map SET-COMM rule 10 set community value '65000:100'
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 10.10.0.200/24
set protocols bgp 20 neighbor peer remote-address 10.10.0.100
set protocols bgp 20 neighbor peer remote-as 20
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Attention

Verify iBGP session establishes.

Step 3: Run command protocols bgp show ip summary at DUT0 and check if output matches the following regular expressions:

10.10.0.200.*Established
Show output
IPv4 Unicast Summary:
BGP router identifier 10.10.0.100, local AS number 20 VRF default vrf-id 0
BGP table version 2
RIB entries 3, using 384 bytes of memory
Peers 1, using 24 KiB of memory

Neighbor        LocalAddr       V         AS   MsgRcvd   MsgSent   TblVer  InQ OutQ  Up/Down        State   PfxRcd   PfxSnt Desc
10.10.0.200     10.10.0.100     4         20         3         5        2    0    0 00:00:01  Established        0        2 FRRouting/10.4.1

Total number of neighbors 1

Attention

Verify that DUT1 receives route 1.1.1.0/24.

Step 4: Run command protocols bgp show ip 1.1.1.0/24 at DUT1 and check if output matches the following regular expressions:

1.1.1.0/24
Show output
BGP routing table entry for 1.1.1.0/24, version 1
Paths: (1 available, best #1, table default)
  Not advertised to any peer
  Local
    10.10.0.100 from 10.10.0.100 (10.10.0.100)
      Origin incomplete, metric 0, localpref 100, valid, internal, best (First path received)
      Last update: Thu Mar  5 14:29:57 2026

Attention

Verify that community 65000:100 is NOT present in DUT1.

Step 5: Run command protocols bgp show ip 1.1.1.0/24 at DUT1 and check if output does not match the following regular expressions:

65000:100
Show output
BGP routing table entry for 1.1.1.0/24, version 1
Paths: (1 available, best #1, table default)
  Not advertised to any peer
  Local
    10.10.0.100 from 10.10.0.100 (10.10.0.100)
      Origin incomplete, metric 0, localpref 100, valid, internal, best (First path received)
      Last update: Thu Mar  5 14:29:57 2026