Re: Filtering/Poisoning ISIS injected 0.0.0.0/0 default route

From: Bob Sinclair (bsin@cox.net)
Date: Mon May 30 2005 - 09:47:11 GMT-3


Long Kwok,

Here is a config and link that permits conditional setting of the attached
bit. I wonder if something along these lines would help.
!
router isis
 net 39.0001.0000.0000.7201.00
 set-attached-bit route-map CONDITION
!
route-map CONDITIONmatch int
loop101http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/isis_an.htmBob
SinclairCCIE #10427, CCSI 30427, CISSPwww.netmasterclass.net----- Original
Message -----
  From: Long Kwok
  To: ccielab@groupstudy.com
  Sent: Sunday, May 29, 2005 3:03 PM
  Subject: Filtering/Poisoning ISIS injected 0.0.0.0/0 default route from L1
internal routers

  Hi,

  I have been trying to filter out the automatically injected 0.0.0.0/0
  route that the L2 border router injects into its L1 internal neighbors
  as I guess it would be considered cheating on lab and you cannot do that
  I was trying to filter via distance 255 under L1 routers isis router
  process but not working. Here is what I tried.

  Router isis

    Distance 255 0.0.0.0 255.255.255.255 1

  Access-list 1 deny 0.0.0.0 0.0.0.0

  Tia Long

  _______________________________________________________________________
  Subscription information may be found at:
  http://www.groupstudy.com/list/CCIELab.html



This archive was generated by hypermail 2.1.4 : Fri Jun 03 2005 - 10:12:03 GMT-3