Filtering Routes with RIP
Problem
You want to restrict what routing information is exchanged within RIP.
Solution
You can filter inbound RIP routes on a per interface basis with a distribute-list:
Router2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router2(config)#access-list
10
deny
Router2(config)#
192.168.20.0
access-list
10
permit any
Router2(config)#router rip
Router2(config-router)#distribute-list
10
in
Router2(config-router)#
Serial 0.1
network
Router2(config-router)#
172.25.0.0
network
Router2(config-router)#
192.168.30.0
exit
Router2(config)#end
Router2#
This configuration example shows how to filter outbound RIP-based routes on a per interface basis:
Router1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router1(config)#access-list
20
permit
Router1(config)#
0.0.0.0
access-list
20
deny any
Router1(config)#router rip
Router1(config-router)#distribute-list
20
out
Router1(config-router)#
Serial0/0.2
network
Router1(config-router)#
172.25.0.0
exit
Router1(config)#end
Router1#
Discussion
The access list in the first configuration example of this
recipe prevents this router from accepting any routing information
about the network 192.168.20.0
:
Router2(config)#access-list
10
deny
Router2(config)#
192.168.20.0
access-list
10
permit any
You can see that this route, which was visible in Recipe 6.1, no longer appears in the routing table:
Router2#show ip route rip
R 172.22.0.0/16 [120/1] via 172.25.2.1, 00:00:21, Serial0.1 R 172.25.1.0/24 ...
Get Cisco IOS Cookbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.