December 2006
Intermediate to advanced
1188 pages
72h 8m
English
You want to restrict what routing information is exchanged within RIP.
You can filter inbound RIP routes on a per interface basis with a distribute-list:
Router2#configure terminalEnter configuration commands, one per line. End with CNTL/Z. Router2(config)#access-list10denyRouter2(config)#192.168.20.0access-list10permit anyRouter2(config)#router ripRouter2(config-router)#distribute-list10inRouter2(config-router)#Serial 0.1networkRouter2(config-router)#172.25.0.0networkRouter2(config-router)#192.168.30.0exitRouter2(config)#endRouter2#
This configuration example shows how to filter outbound RIP-based routes on a per interface basis:
Router1#configure terminalEnter configuration commands, one per line. End with CNTL/Z. Router1(config)#access-list20permitRouter1(config)#0.0.0.0access-list20deny anyRouter1(config)#router ripRouter1(config-router)#distribute-list20outRouter1(config-router)#Serial0/0.2networkRouter1(config-router)#172.25.0.0exitRouter1(config)#endRouter1#
The access list in the first configuration example of this
recipe prevents this router from accepting any routing information
about the network 192.168.20.0:
Router2(config)#access-list10denyRouter2(config)#192.168.20.0access-list10permit any
You can see that this route, which was visible in Recipe 6.1, no longer appears in the routing table:
Router2#show ip route rip R 172.22.0.0/16 [120/1] via 172.25.2.1, 00:00:21, Serial0.1 R 172.25.1.0/24 ...