IP Routing Policy
263
By default, the filtering of received routes is not performed.
Configuring the Filtering of Distributed Routes
Define a policy concerning route distribution that filters the routing information that
does not satisfy the conditions, and distributes routes with the help of an ACL or
address ip-prefix.
Perform the following configuration in Routing Protocol View.
The route policy supports importing the routes discovered by the following protocols
into the routing table:
■
Direct—The hop (or host) to which the local interface is directly connected.
■
Static—Static Route Configuration
■
RIP—Route discovered by RIP
■
OSPF—Route discovered by OSPF
■
OSPF-ASE—External route discovered by OSPF
■
OSPF-NSSA—NSSA route discovered by OSPF
By default, the filtering of distributed routes is not performed.
Forwarding Layer 3
Broadcast Packets
Broadcast packets include full-net broadcast packets and directly connected broadcast
packets. The destination IP address of a full-net broadcast packet is all 1s
(255.255.255.255) or all 0s. A directly-connected broadcast packet is a packet whose
destination IP address is the network broadcast address of a subnet, but the source IP
address is not in the subnet segment. When a switch forwards this kind of packet, the
switch cannot tell whether the packet is a broadcast packet if the switch is not
connected with the subnet.
If a broadcast packet reaches the destination network after being forwarded by the
switch, the switch will receive the broadcast packet, for the switch also belongs to the
subnet. Since the VLAN of the switch isolates the broadcast domain, the switch will
Table 258
Configuring the Filtering of Received Routes
Operation
Command
Configure to filter the received
routing information distributed by
the specified address
filter-policy gateway
ip_prefix_name
import
Cancel the filtering of the received
routing information distributed by
the specified address
undo filter-policy gateway
ip_prefix_name
import
Configure to filter the received
global routing information
filter-policy
{
acl_number
|
ip-prefix
ip_prefix_name
}
[
gateway
]
import
Cancel the filtering of the received
global routing information
undo filter-policy
{
acl_number
|
ip-prefix
ip_prefix_name
}
[
gateway
]
import
Table 259
Configuring to filter the distributed routes
Operation
Command
Configure to filter the routes
distributed by the protocol
filter-policy
{
acl_number
|
ip-prefix
ip_prefix_name
}
export
[
routing_process
Cancel the filtering of the routes
distributed by the protocol
undo filter-policy
{
acl_number
|
ip-prefix
ip_prefix_name
}
export
[
routing_process
]
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...