hit counter script

Cisco IE-4000 Software Configuration Manual page 744

Industrial ethernet switch
Hide thumbs Also See for IE-4000:
Table of Contents

Advertisement

Configuring MSDP
Configuring MSDP
Command
3.
access-list access-list-number
{deny | permit} source
[source-wildcard]
or
access-list access-list-number
{deny | permit} protocol source
source-wildcard destination
destination-wildcard
4.
end
5.
show running-config
6.
copy running-config
startup-config
To remove the filter, use the no ip msdp redistribute global configuration command.
EXAMPLE
The following example shows how to configure which (S, G) entries from the mroute table are advertised in SA messages
originated from AS 64512:
Switch(config)# ip msdp redistribute route-map customer-sources
Switch(config)# route-map customer-sources permit
Switch(config)# match as-path 100
Switch(config)# ip as-path access-list 100 permit ^64512$
Filtering Source-Active Request Messages
By default, only switches that are caching SA information can respond to SA requests. By default, such a switch honors
all SA request messages from its MSDP peers and supplies the IP addresses of the active sources.
Purpose
Create an IP standard access list, repeating the command as
many times as necessary.
or
Create an IP extended access list, repeating the command as
many times as necessary.
For access-list-number, the range is 1 to 99 for standard
access lists and 100 to 199 for extended lists. Enter the
same number created in Step 2.
The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
For protocol, enter ip as the protocol name.
For source, enter the number of the network or host from
which the packet is being sent.
For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in
the bit positions that you want to ignore.
For destination, enter the number of the network or host to
which the packet is being sent.
For destination-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the destination. Place
ones in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit
deny statement for everything.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
740

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie-5000Ie-4010

Table of Contents