Hello List!



Quick question
for you.



 



In this task,
we have to stop autorp info leaking into neighbouring BGP ASNs.



 



The solutions
guide uses this idea:



 



ip 
access-list extended STOPRP



deny ip any
224.0.1.39



deny ip any
224.0.1.40



permit ip any



 



int serx/x/x



decr Border
interface to another AS.



ip access-group
STOPRP in



ip access-group
STOPRP out



 



ip pim
send-rp-announce loo 0 scope 5



ip pim
send-rp-disc loo 0 scope 5



 



I went down the
"ip multicast boundary <ACL> filter auto-rp" route, which I
take to be equally valid.  That is not my question.  Remember the old
CCNA rule: outbound ACLs filter traffic flowing through a router, but not
originated by the router?  Well, if the router in the above scenario is RP
and the mapping agent, would that outbound ACL actually stop the autorp traffic
as it is being originated by the router itself?



George.



 


                                          
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

http://onlinestudylist.com/mailman/listinfo/ccie_rs

Reply via email to