8.4 ISIS路由泄露

图片[1]-8.4 ISIS路由泄露-大赛人网
图8-4 ISIS路由泄露网络拓扑

1.R2使用ACL匹配要泄露的路由,匹配到level-1默认L1会引入L2中,L2不会引入到L1中

[R2]acl 2000
[R2-acl-basic-2000]rule permit source 6.6.6.6 0
[R2]isis 1
[R2-isis-1]import-route isis level-2 into level-1 filter-policy 2000

2.R1查看isis路由信息

[R1]display ip routing-table protocol isis
    0.0.0.0/0   ISIS-L1 15   10          D   12.1.1.2        GigabitEthernet0/0/1
        2.2.2.2/32  ISIS-L1 15   10          D   12.1.1.2        GigabitEthernet0/0/1
        6.6.6.6/32  ISIS-L1 15   50          D   12.1.1.2        GigabitEthernet0/0/1
       23.0.0.0/8   ISIS-L1 15   20          D   12.1.1.2        GigabitEthernet0/0/1

3.R2使用route-policy方式匹配要泄露的路由

[R2]isis 1 
[R2-isis-1]undo  import-route isis level-2 into level-1 filter-policy 2000

[R2]acl 2001
[R2-acl-basic-2001]rule permit source 6.6.6.6 0
[R2]route-policy dsrw permit node 10
[R2-route-policy]if-match  acl 2001
[R2]isis 1
[R2-isis-1]import-route isis  level-2 into level-1 filter-policy route-policy dsrw

4.R1查看isis路由信息

[R1]display ip routing-table protocol isis
  0.0.0.0/0   ISIS-L1 15   10          D   12.1.1.2        GigabitEthernet0/0/1
        2.2.2.2/32  ISIS-L1 15   10          D   12.1.1.2        GigabitEthernet0/0/1
        6.6.6.6/32  ISIS-L1 15   50          D   12.1.1.2        GigabitEthernet0/0/1
       23.0.0.0/8   ISIS-L1 15   20          D   12.1.1.2        GigabitEthernet0/0/1
© 版权声明
THE END
喜欢就支持一下吧
点赞8 分享
评论 抢沙发
头像
欢迎您留下宝贵的见解!
提交
头像

昵称

取消
昵称

    请登录后查看评论内容