9-25
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 9 Configuring IP Routing
Configuring EIGRP
hostname(config-router)#
passive-interface
{
default
|
if-name
}
Using the
default
keyword disables EIGRP routing updates on all interfaces. Specifying an interface
name, as defined by the
nameif
command, disables EIGRP routing updates on the specified interface.
You can have multiple
passive-interface
commands in your EIGRP router configuration.
Step 4
(Optional) To control the sending or receiving of candidate default route information, enter the following
command:
hostname(config-router)#
no default-information
{
in
|
out
}
Configuring
no default-information in
causes the candidate default route bit to be blocked on received
routes. Configuring
no default-information out
disables the setting of th edefault route bit in advertised
routes.
Step 5
(Optional) To filter networks sent in EIGRP routing updates, perform the following steps:
a.
Create a standard access list that defines the routes you want to advertise.
b.
Enter the following command to apply the filter. You can specify an interface to apply the filter to
only those updates sent by that interface.
hostname(config-router):
distribute-list
acl
out
[
interface
if_name
]
You can enter multiple
distribute-list
commands in your EIGRP router configuration.
Step 6
(Optional) To filter networks received in EIGRP routing updates, perform the following steps:
a.
Create a standard access list that defines the routes you want to filter from received updates.
b.
Enter the following command to apply the filter. You can specify an interface to apply the filter to
only those updates received by that interface.
hostname(config-router):
distribute-list
acl
in
[
interface
if_name
]
You can enter multiple
distribute-list
commands in your EIGRP router configuration.
Enabling and Configuring EIGRP Stub Routing
You can configure the security appliance as an EIGRP stub router. Stub routing decreases memory and
processing requirements on the security appliance. As a stub router, the security appliance does not need
to maintain a complete EIGRP routing table because it forwards all nonlocal traffic to a distribution
router. Generally, the distribution router need not send anything more than a default route to the stub
router.
Only specified routes are propagated from the stub router to the distribution router. As a stub router, the
security appliance responds to all queries for summaries, connected routes, redistributed static routes,
external routes, and internal routes with the message “inaccessible.” When the security appliance is
configured as a stub, it sends a special peer information packet to all neighboring routers to report its
status as a stub router. Any neighbor that receives a packet informing it of the stub status will not query
the stub router for any routes, and a router that has a stub peer will not query that peer. The stub router
depends on the distribution router to send the proper updates to all peers.
To enable and configure and EIGRP stub routing process, perform the following steps:
Step 1
Create the EIGRP routing process and enter router configuration mode for that process by entering the
following command:
hostname(config)#
router eigrp
as-num
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......