![](../p_w_upload/200711/200711291196342504781.gif)
这个案例通过在R3上配置与访问列表结合的正则表达式,以阻止通过BGP发送过来的网络能通过AS300传到R4。
当来自一个特定AS的所有路由都需要过滤时,基于AS路径信息的过滤路由是非常有效的。如果不使用基于AS路径的过滤,我们不得不一个接一个地 列出所有AS300相关的每个路由。就像上一篇distribute-list中的方法一样。而AS路径过滤提供了一种高效的替代方法。
r1
int f2/0
ip ad 192.1.1.1 255.255.255.0
int f3/0
ip ad 193.1.1.1 255.255.255.0
int lo0
ip ad 1.1.1.1 255.255.255.0
int lo1
ip ad 2.2.2.2 255.255.255.0
router bgp 100
no syn
neighbor 192.1.1.2 remote-as 200
neighbor 193.1.1.3 remote-as 200
network 1.0.0.0
network 1.0.0.0
neighbor 193.1.1.3 route-map aspath out
neighbor 193.1.1.3 filter-list 1 out
access-list 1 permit 1.0.0.0 0.255.255.255
//这个acc 1与下边的不同
route-map aspath 10
match ip ad 1
set aspath prepend 300 400
route-map aspath 20
ip as-path access-list 1 deny _300_ //拒绝任何通过AS300的路由
ip as-path access-list 1 permit .*
r2
int f2/0
ip ad 192.1.1.2 255.255.255.0
int f4/0
ip ad 194.1.1.2 255.255.255.0
router os 1
netw 0.0.0.0 255.255.255.255 a 0
passive-interface f2/0
router bgp 200
no syn
neighbor 192.1.1.1 remote-as 100
neighbor 194.1.1.4 remote-as 200
neighbor 195.1.1.3 remote-as 200
neighbor 194.1.1.4 next-hop-self
r3
int f3/0
ip ad 193.1.1.3 255.255.255.0
int f5/0
ip ad 195.1.1.3 255.255.255.0
router os 1
netw 0.0.0.0 255.255.255.255 a 0
passive-interface f3/0
router bgp 200
no syn
neighbor 193.1.1.1 remote-as 100
neighbor 195.1.1.4 remote-as 200
neighbor 195.1.1.4 next-hop-self
neighbor 194.1.1.2 remote-as 200
r4
int f4/0
ip ad 194.1.1.4 255.255.255.0
int f5/0
ip ad 195.1.1.4 255.255.255.0
int lo0
ip ad 4.4.4.4 255.255.255.0
router os 1
netw 0.0.0.0 255.255.255.255 a 0
router bgp 200
no syn
neighbor 194.1.1.2 remote-as 200
neighbor 195.1.1.3 remote-as 200
netw 4.0.0.0
验证始终都是重头戏:
验证结果应该是300这条路由在R3上消失,被过滤。
转载于:https://blog.51cto.com/ciscodocu/52811