09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

or from a specific set of <strong>network</strong>s. Applying an inbound route filter will suppress any<br />

unauthorized <strong>network</strong>s from being injected in<strong>to</strong> <strong>the</strong> routing table.<br />

Here are inbound filter examples using OSPF and RIP (see Figure 10.9). ABR-a57 is<br />

filtering announcements from ir-23 and ir-24. Only <strong>the</strong> 192.168.x.0 <strong>network</strong>s<br />

need <strong>to</strong> be accessible throughout <strong>the</strong> <strong>network</strong>. The 10.0.x.0 <strong>network</strong>s are used for<br />

local testing and only need <strong>to</strong> be available <strong>to</strong> <strong>the</strong> <strong>network</strong>s directly connected <strong>to</strong><br />

ir-33 and ir-34. The first router configuration example shows OSPF using an<br />

inbound distribution list <strong>to</strong> suppress <strong>the</strong> addition of <strong>the</strong> 10.0.x.0 routes on <strong>the</strong> local<br />

routing table. The next example shows <strong>the</strong> same thing with RIP. The RIP usage of<br />

<strong>the</strong> inbound command also prevents <strong>the</strong> 10.0.x.0 routes from<br />

being announced <strong>to</strong> ABR-a58 and ABR-a56:<br />

Figure 10.9. A campus backbone <strong>network</strong> example<br />

for using <strong>the</strong> route<br />

distribution/suppression command.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!